Resources

‘Revival Hijack on PyPI: Concealing Malware with Authentic File Names’

Security Researchers Uncover Threat of Malicious Payloads via PyPI Revival Hijack Security researchers have uncovered a devious tactic that enables attackers to distribute malicious payloads...

Netherlands Data Protection Authority imposes €30.5M fine on Clearview AI for unauthorized database

Dutch Data Protection Authority Imposes Record Fine on Clearview AI for Privacy Violations The Dutch Data Protection Authority (DPA) has made headlines by imposing a...

Check Point Software Names Ruma Balasubramanian as New APAC President – Intelligent CISO

Check Point Software Appoints Ruma Balasubramanian as President for APAC Check Point Software has announced the appointment of Ruma Balasubramanian as the new President for...

Check Point and Cisco Increase AI Investments Through New Deals

Investments in AI Threat Detection and Risk Management by Cybersecurity Giants In the world of cybersecurity, giants like Check Point Software and Cisco are not...

Columbus Secures Restraining Order Against Data Breach

City of Columbus Obtains Restraining Order Against Cybersecurity Expert David L. Ross Jr. - Controversy Surrounding Data Breach and Legal Action The city of Columbus...

CrowdStrike and NVIDIA Collaborate to Enhance Security for Generative AI Innovation – Intelligent CISO

CrowdStrike Enhances NVIDIA NIM Agent Blueprints with AI-native Cybersecurity Platform CrowdStrike, a leader in AI-native cybersecurity, has partnered with NVIDIA to enhance the security of...

A Handful of Security Technologies Can Make a Significant Impact on Premiums

Enhancing Cybersecurity Defenses and Strategies Amid Rising Ransomware Threats Change Healthcare, a healthcare-billing services firm, fell victim to a cyber attack by the BlackCat ransomware...

Iranian State Hackers Facilitate Ransomware Gangs as Access Middlemen

Iranian Cyber Actors Collaborate with Ransomware Groups to Target U.S. and Allies: Warning from FBI, CISA, and DC3 A shadowy group of Iranian cyber actors...

Technology Leaders Discuss Women’s Equality Day – Smart Chief Information Security Officers

Tech Leaders Reflect on Women's Equality Day 2024 On Women's Equality Day 2024, the tech sector stands at a pivotal moment in its journey towards...

Asian Military and Government Organizations Attacked by Hackers Using Uncommon Stealth Tactics

Stealth Techniques Used to Infect High-Level Organizations in Southeast Asia Breaking News: Stealth Techniques Target High-Level Organizations in Southeast Asia An ongoing campaign in southeast Asia...

Zimbabwean Officials Receive Cybersecurity Training in 4-Day Session

Government Training Program Strengthens Zimbabwe’s Cybersecurity Defenses Zimbabwe's government is stepping up its efforts to enhance national cybersecurity capabilities through a comprehensive training program for...

New report from WithSecure shows leveling off of ransomware activity, according to Intelligent CISO

Insights from the New WithSecure Report on Ransomware Evolution With ransomware attacks on the rise, a new report by WithSecure sheds light on the evolving...

Recent articles