By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due…
Cybersecurity researchers at FortiGuard Labs recently found an unseen infostealer dubbed “ThirdEye” that is mainly crafted to steal several information…
By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall…
[ This article was originally published here ] Executive summary is a technique that hackers use to gain unauthorized access…
Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework…
ESG [Environment, Social and Governance] is everyone’s favourite new acronym, working as a catch-them-all for climate action, worker rights, social…
Ann Dunkin is CIO at the US Department of Energy (DOE). Among her responsibilities, she heads IT and oversees cybersecurity….
MITRE shared today this year’s list of the top 25 most dangerous weaknesses plaguing software during the previous two years….
Released by the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA), the cybersecurity information sheet (CSI)…
Charming Kitten APT Group Uses Innovative Spear-phishing Methods. Volexity researchers recently noticed that threat actors are actively intensifying their efforts…
Securing the healthcare data warehouses themselves is equally vital to ensure the software applications’ security in their development and maintenance….
NHS England has signed a five-year deal that will see the Microsoft 365 cloud-based online productivity suite of services rolled…