Resources

US-Taiwan Defense Conference targeted by stealthy fileless attack

Sophisticated Cyber Campaign Targeting US-Taiwan Defense Industry Conference Attendees Uncovered by CRIL Cyble Research and Intelligence Labs (CRIL) has uncovered a sophisticated cyber campaign targeting...

Strategies for a Dynamic Organization to Proactively Manage Risks and Ensure Security and Resilience – Intelligent CISO

Expert Insights: Navigating Cybersecurity Challenges and Strategies in the Digital Era Faisal Khan, the Associate Director for Information Security and Compliance at the Dubai World...

Fortinet Affirms Third-Party Data Breach Involving Customer Information

Fortinet Data Breach Exposes Customer Information: A Closer Look and Recommendations A Fortinet breach has led to the compromise of data belonging to a small...

Teen arrested for involvement in Transport for London cyberattack

Teenager Arrested in Connection to Cyberattack on Transport for London (TfL) - NCA Leads Investigation A 17-year-old male was arrested in Walsall following a major...

Is the holiday season the most wonderful time of the year… for Cybercriminals? – Intelligent CISO

Securing Educational Institutions from Cyberattack: Insights from Don Boxley, CEO and Co-Founder, DH2i Don Boxley, CEO and Co-Founder of DH2i, is addressing the pressing issue...

Microsoft Reveals Four Zero-Day Vulnerabilities in Latest September Update

Microsoft's September Patch Update Reveals Active Exploitation of Critical Vulnerabilities Hackers are wasting no time in exploiting critical vulnerabilities identified in Microsoft's latest security update....

Researchers Link Loki Backdoor to Mythic Framework

Uncovering the Loki Backdoor: Insights into the Mythic Framework and Its Malicious Intentions In a startling discovery in July 2024, researchers unearthed a new backdoor...

Introducing Vanta’s innovative new products for the future of GRC – Intelligent CISO

Vanta Introduces New Products for the Future of GRC Vanta, a leading provider of security and compliance solutions, has unveiled a series of new features...

Federal Authorities Issue Warning of Russian Cyberattacks Targeting Critical Infrastructure

Russian GRU Unit 29155 accused of cyber attacks on global critical infrastructure The United States and its allies, including the UK, have leveled accusations against...

Ukrainian Military Personnel Targeted in Gamaredon Campaign

Emergence of Gamaredon APT Group's Spear-Phishing Campaign Targeting Ukrainian Military Personnel and Systems In a disturbing turn of events, the Gamaredon APT group has launched...

Proofpoint Introduces Comprehensive Information Protection Framework to Tackle Advanced Data Loss Prevention Challenges – Intelligent CISO

Proofpoint Launches Proprietary Information Protection Framework to Address DLP Challenges Proofpoint, a leading cybersecurity and compliance company, is revolutionizing the data loss prevention (DLP) landscape...

‘Revival Hijack on PyPI: Concealing Malware with Authentic File Names’

Security Researchers Uncover Threat of Malicious Payloads via PyPI Revival Hijack Security researchers have uncovered a devious tactic that enables attackers to distribute malicious payloads...

Recent articles