The state of cybersecurity and IT talent shortages
This article highlights key findings and trends in the 2024 IT and cybersecurity skills gap, from the shortage of cybersecurity...
Read more →This article highlights key findings and trends in the 2024 IT and cybersecurity skills gap, from the shortage of cybersecurity...
Read more →Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has...
Read more →This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. SafeLine: Open-source...
Read more →“I cannot believe that we’re seeing command injection vulnerabilities in 2024 in any products, let alone a secure remote access...
Read more →Cisco has confirmed the authenticity of a 4.45GB data leak posted online by the hacker known as IntelBroker. The leaked...
Read more →A Chinese state-sponsored hacker has successfully breached the US Treasury Department’s systems, gaining access to employee workstations and unclassified documents,...
Read more →An X user claimed a 7-Zip zero-day vulnerability, but 7-Zip’s creator says is a fake Pierluigi Paganini December 31, 2024...
Read more →Former subpostmasters and leading campaigners in the Post Office scandal have been honoured for their decades-long fight against the injustices...
Read more →The Chinese-linked Salt Typhoon cyberespionage operation targeted AT&T and Verizon’s systems, but the wireless carriers’ US networks are now secure...
Read more →Chinese state-sponsored threat actors hacked the U.S. Treasury Department after breaching a remote support platform used by the federal agency. In...
Read more →SUMMARY Large-Scale Breach: Over 16 Chrome extensions were compromised, exposing 600,000+ users to data and credential theft. Phishing Attack: Developers...
Read more →In the ongoing battle against cyber threats, the Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical vulnerability in...
Read more →