The Best of Both Worlds Made Possible with A Hybrid SOC
By Chase Richardson, Principal Lead Consultant, Bridewell The revolving door of cyber-attacks on major organizations continues to turn. Among the most significant of breaches over…
By Chase Richardson, Principal Lead Consultant, Bridewell The revolving door of cyber-attacks on major organizations continues to turn. Among the most significant of breaches over…
Comparitech recently conducted research into exactly this, looking at the top 100 stadiums in world football around the world, to figure out which football fans…
A cyberattack campaign is targeting exposed Microsoft SQL (MS SQL) databases, aiming to deliver ransomware and Cobalt Strike payloads. The attack campaign The attackers target…
Identity and access management (IAM) specialist Okta has warned its customers to be alert to a developing campaign of cyber attacks in which an unknown…
In a concerning development in the cybersecurity domain, South Korea has become the battleground for a highly sophisticated espionage campaign. The Cyble Research and Intelligence…
Dastardly is a powerful web vulnerability DAST (Dynamic Application Security Testing) scanner developed to assist organizations in effectively safeguarding their web applications. It is a free,…
From decades in the making to overnight impact, nobody was prepared for how quickly generative AI landed. But businesses can be ready for the next…
The researchers found, in fact, that some firms appear to be taking that second option. They point to a July 2022 document posted to the…
By Alysia Silberg, CEO, Street Global As technology increasingly connects us, people, businesses, and governments are more concerned with Cybersecurity than ever before. The development…
TXOne Networks announced the second generation of its Edge engine for eliminating the spread of operational technology (OT) network infections and safeguarding reliable operations. Edge…
Germany’s Constitutional Court remains unclear about whether evidence collected by an international police operation to penetrate an encrypted phone network used by organised criminals can…
Mozilla has analyzed 25 major car brands and gave all of them failing marks for privacy and security. They collect significant amounts of personal data…