Resources

Zimbabwean Officials Receive Cybersecurity Training in 4-Day Session

Government Training Program Strengthens Zimbabwe’s Cybersecurity Defenses Zimbabwe's government is stepping up its efforts to enhance national cybersecurity capabilities through a comprehensive training program for...

New report from WithSecure shows leveling off of ransomware activity, according to Intelligent CISO

Insights from the New WithSecure Report on Ransomware Evolution With ransomware attacks on the rise, a new report by WithSecure sheds light on the evolving...

MoonPeak RAT Continues to Evolve, Tied to North Korean Espionage

New Variant of XenoRAT Malware Linked to North Korean Group MoonPeak A new variant of the notorious XenoRAT information-stealing malware, identified by researchers at Cisco...

Fidelity Bank Denies Allegations of Data Breach, Refuses to Pay ₦555.8 Fine

Fidelity Bank Data Breach: Nigerian Bank Denies Allegations and Contests Fine The controversy surrounding Fidelity Bank Data Breach has reached new heights with the Nigerian...

Group-IB and SecurityHQ team up to boost cybersecurity and elevate SOC capabilities – Intelligent CISO

Group-IB and SecurityHQ Announce Global Partnership Agreement for Cybersecurity Enhancement Group-IB, a renowned cybersecurity technology creator, has joined forces with SecurityHQ, a global Managed Security...

Exposed Secrets in Azure Kubernetes Cluster Due to Bug

Critical Privilege Escalation Vulnerability Patched in Azure Kubernetes Service (AKS) Microsoft has recently addressed a critical privilege escalation vulnerability in its managed Azure Kubernetes Service...

Microsoft Requires Multi-Factor Authentication for Azure Sign-ins

Microsoft Implements Mandatory Multi-Factor Authentication (MFA) for Azure Sign-Ins: Enhancing Cloud Security Microsoft is making a bold move to enhance the security of its Azure...

Lessons for Today from Key Changes Since the 1990s – An Insightful CISO Perspective

Lessons from the Past: Understanding the Evolution of Cybersecurity and Its Impact Today Danny Wheeler, Director of IT at Recast Software, has a message for...

Is the 2024 US Political Campaigns Ready for the Upcoming Cyber Threats?

Cyber Threats to 2024 US Elections: Are Parties, Campaigns, and Officials Prepared? Cyber threats to the 2024 US elections have surged in recent days, raising...

Top Vulnerabilities of the Week: Exposing SAP, Ivanti, AMD, and Microsoft

Top Vulnerabilities of the Week for Cyble Researchers This week has been full of security vulnerabilities, with researchers at Cyble uncovering 40 vulnerabilities in their...

BeyondTrust Launches New European Cloud Region forIdentity Security Insights- Intelligent CISO

BeyondTrust Announces New European Cloud Region for Identity Security Insights BeyondTrust, a leader in identity security solutions, has announced the launch of a new European...

Exploring Zero-Trust Outcomes in OT Cybersecurity: A New ISAGCA Report

ISA Global Cybersecurity Alliance (ISAGCA) Releases White Paper on Zero Trust Model for Cybersecurity in OT and ICS ISA Global Cybersecurity Alliance (ISAGCA) Releases White...

Recent articles