Resources

Exposed Legitimate Credentials Drive Snowflake Account Attacks

Analysis of a Major Data Breach: Lessons Learned and How to Protect Your Organization In a shocking turn of events, threat actors have successfully executed...

Virginia Department of Elections Refutes Allegations of Data Breach

Virginia Department of Elections Dismisses Data Breach Allegations & Confirms Data Scraped from Official Website The Virginia Department of Elections recently faced allegations of a...

Singaporean and Malaysian companies resort to paying ransoms due to shortcomings in cyber resilience and data recovery efforts – Intelligent CISO

Cohesity Research Reveals Challenges in Data Recovery and Business Processes After Cyberattacks The research commissioned by Cohesity has revealed a concerning trend among companies in...

Lineaje receives contract from US Air Force Department

Lineaje Selected by U.S. Air Force for SBOM360 Contract Lineaje, a leading provider of continuous software supply chain security management solutions, has made a significant...

ChatGPT and Google Gemini Successfully Pass Cybersecurity Exams

Exploring the Impact of Large Language Models on Ethical Hacking Practices: A Study by the University of Missouri and Amrita University The collaborative efforts of...

British local authorities record more than 5,000 data breaches – Intelligent CISO

Apricorn's Annual Findings on Data Breaches Amongst Local Councils Apricorn, a leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB drives, has raised alarm bells...

5 Strategies for Reducing the Threat of Data Exfiltration

Mitigating the Risk of Data Breaches: Strategies for Protecting Your Organization's Information Data breaches and cyberattacks continue to be a prevalent threat in the digital...

Act 33 of Pennsylvania’s New Law Provides Aid to Victims of Data Breaches

Pennsylvania's Act 33: Strengthening Consumer Protections After Data Breaches - Key Provisions and Impact The state of Pennsylvania has taken a bold step towards protecting...

Strategies for Prominent Figures to Safeguard Against Catphishing Threats – Intelligent CISO

Protecting Prominent Individuals from Cyber Threats: Insights from Mimecast, EY, SailPoint, and Beachhead Solutions Mimecast has issued a critical plea to the UK Parliament to...

Euro Vishing Scammers Employing Physical Intimidation as Part of Their Tactics

"Europol Arrests 54 in Connection with Vishing Scam Targeting Elderly Spanish Citizens" Europol's recent announcement of the arrest of 54 individuals involved in a voice...

GootLoader Malware Utilizes Techniques with Time-Based Delays

Analyzing GootLoader's Evasive Techniques Through Node.js Debugging in Visual Studio Code Researchers have made a groundbreaking discovery in the fight against GootLoader, a sophisticated JavaScript-based...

Potential Troubles with QR Codes as Official Digital Access Points to Olympics Locations

The Danger of QR Codes at the Olympic Games: A Security Expert's Perspective In a world where QR codes have become a common sight for...

Recent articles