How end-user phishing training works (and why it doesn’t)
It always takes two for a phishing attack to work – an attacker to send the bait and an insider...
Read more →It always takes two for a phishing attack to work – an attacker to send the bait and an insider...
Read more →Airbus, a renowned leader in the aerospace industry, has recently found itself at the center of a highly sophisticated cyber-attack,...
Read more →Sep 13, 2023THNKubernetes / Cloud Security Three interrelated high-severity security flaws discovered in Kubernetes could be exploited to achieve remote...
Read more →GitHub has fixed a race condition vulnerability in its repository creation and user renaming operations that could have enabled threat...
Read more →For CISOs to gain the support of the board, they must first translate and report highly technical cybersecurity concerns and...
Read more →Microsoft is investigating an ongoing outage preventing customers from sending or receiving messages using the company’s Microsoft Teams communication platform....
Read more →Cisco has unveiled Cisco Secure Application (previously Security Insights for Cloud Native Application Observability) on the Cisco Full-Stack Observability Platform,...
Read more →The US Department of Energy (DOE) on Tuesday announced a total of $39 million in funding for nine National Laboratory...
Read more →Global cryptocurrency exchange CoinEX announced that someone hacked its hot wallets and stole large amounts of digital assets that were used...
Read more →Sep 13, 2023THNVulnerability / Data Security More details have emerged about a set of now-patched cross-site scripting (XSS) flaws in...
Read more →NGO Save the Children, one of the world’s oldest and largest charities, has confirmed it has fallen victim to a...
Read more →Several US government agencies on Tuesday published a cybersecurity information sheet focusing on the threat posed by deepfakes and how...
Read more →