Industry regulations and standards are driving OT security priorities
When it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments,...
Read more →When it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments,...
Read more →Like it or not, data protection will be one of the biggest issues organizations face in 2024. Knowing where to...
Read more →The ThreatNG Governance and Compliance Dataset is an open-source initiative that aims to democratize access to critical data, fostering transparency,...
Read more →Microsoft’s December 2023 Patch Tuesday is a light one: 33 patches, only four of which are deemed critical. “This month,...
Read more →Censys announced two new product tiers of its search tool, Censys Search Solo and Censys Search Teams. These additions are...
Read more →North Korea-backed group Lazarus has been spotted exploiting the Log4Shell vulnerability (CVE-2021-44228) and novel malware written in DLang (i.e., the...
Read more →Recruiters are being targeted via spear-phishing emails sent by cybercrooks impersonating job applicants, Proofpoint researchers are warning. “The tone and...
Read more →SafeBreach researchers have discovered eight new process injection techniques that can be used to covertly execute malicious code on Windows...
Read more →A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute...
Read more →The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as...
Read more →In this Help Net Security interview, Matt Holland, CEO of Field Effect, discusses achieving a balance for businesses between the...
Read more →Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data (i.e., data...
Read more →