Uncategorized

by

U.S. and Polish Authorities Shut Down Infamous Bulletproof Hosting Platform

The Lolek Hosted platform provided malicious actors anonymity in cyberattacks and malware distribution. The post U.S. and Polish Authorities Shut Down Infamous...

Read More →

by

Black Hat 2023: Delving Into the Intersection of Artificial Intelligence and Cybersecurity

Black Hat 2023 conference is taken over by the emergence of artificial intelligence (AI) and how cybersecurity products can evolve with this new technology....

Read More →

by

Navigating the Pros and Cons of Generative AI in FinServ

How can businesses make the most of generative AI in finserv while tackling the risks? The post Navigating the Pros and Cons of Generative AI in FinServ...

Read More →

by

Russia-Backed Bad Actors Attack Government Agencies Through Microsoft Teams

The hackers exploited compromised Microsoft 365 accounts to generate fraudulent Microsoft support domains. The post Russia-Backed Bad Actors Attack Government...

Read More →

by

One-Third of the Top 12 Exploited Vulnerabilities Reside in Microsoft Products

Five Eyes identified 42 vulnerabilities, 14 of which are from Microsoft products. The post One-Third of the Top 12 Exploited Vulnerabilities Reside in...

Read More →

Uncategorized

by

Russia-Backed Bad Actors Attack Government Agencies Through Microsoft Teams

The hackers exploited compromised Microsoft 365 accounts to generate fraudulent Microsoft support domains. The post Russia-Backed Bad Actors Attack Government...

Read More →

by

External Exposure Management: Are Your Attack Surfaces Safe?

How can enterprises protect their growing attack surface? The post External Exposure Management: Are Your Attack Surfaces Safe? appeared first on Spiceworks....

Read More →

Uncategorized

by

Cybersecurity and AI/ML, Before the New Age of AI: Managed Detection and Response

Key insights from an Aberdeen study on managed detection and response (MDR). The post Cybersecurity and AI/ML, Before the New Age of AI: Managed Detection and...

Read More →

by

MOVEit Vulnerability Impact: Over 500 Organizations, 34M+ Individuals and Counting

The MOVEit hack is one of the, if not the most significant, exploitation of a zero-day vulnerability. The post MOVEit Vulnerability Impact: Over 500...

Read More →

Uncategorized

by

NIST Cybersecurity Framework vs. CIS Controls Version 8

Comparing the NIST Cybersecurity and CIS Controls Version 8 frameworks to understand how to choose the right one. The post NIST Cybersecurity Framework vs. CIS...

Read More →

by

White House Charts the Course for the National Cybersecurity Strategy Implementation

The National Cybersecurity Strategy Implementation Plan document includes 65 initiatives, each assigned to respective agencies to oversee the progress. The...

Read More →

by

Cybersecurity Skills Shortage: Transforming Managed Services?

Addressing the cybersecurity skills shortage is crucial across sectors. The post Cybersecurity Skills Shortage: Transforming Managed Services? appeared first...

Read More →

Close Search Window
Close