AI Could Transform Detection and Response as Legacy MDRs Lack
05
May
2024

AI Could Transform Detection and Response as Legacy MDRs Lack

A recent study conducted by Radiant Security, reveals significant dissatisfaction among IT security professionals with their current managed detection and…

Four ways to make yourself a harder target for cybercriminals
05
May
2024

Don’t Overlook the Cyber Risks for Operational Technology

U.S. officials and private security experts have warned that this country’s physical infrastructure is being threatened by growing stealth attacks…

Android malware
05
May
2024

Finland warns of Android malware attacks breaching bank accounts

Finland’s Transport and Communications Agency (Traficom) is warning about an ongoing Android malware campaign attempting to breach online bank accounts….

The Quantum Security Challenge: Data Resilience Around the Unknown
05
May
2024

The Quantum Security Challenge: Data Resilience Around the Unknown

In today’s digital age, safeguarding our systems and data is a monumental change. We have crafted intricate algorithms to encrypt…

Offensive Awakening: The 2024 Shift from Defensive to Proactive Security
05
May
2024

Offensive Awakening: The 2024 Shift from Defensive to Proactive Security

Adversarial Cyber Exercises Are The New Mandate By Stephen Gates, Principal SME, Horizon3.ai After observing the cyber threat landscape in…

How K-12 Schools Can Solve Their Top 10 Cybersecurity Challenges
05
May
2024

How K-12 Schools Can Solve Their Top 10 Cybersecurity Challenges

05 May How K-12 Schools Can Solve Their Top 10 Cybersecurity Challenges IT leaders can overcome obstacles through the right…

Russia-linked APT29 spotted targeting JetBrains TeamCity servers
05
May
2024

NATO and the EU formally condemned APT28 cyber espionage

NATO and the EU formally condemned Russia-linked APT28 cyber espionage Pierluigi Paganini May 05, 2024 NATO and the European Union…

Navigating the Digital Age: AI’s Crucial Role in Cybersecurity Reinforcement
05
May
2024

Navigating the Digital Age: AI’s Crucial Role in Cybersecurity Reinforcement

Harnessing the Power of AI for Advanced Cyber Threat Intelligence and Prevention By Bryan Kissinger, Senior Vice President of Security…

assumptions_made · Joseph Thacker
05
May
2024

assumptions_made · Joseph Thacker

Pitching the assumptions_made metadata field for AI Agents I’ve been thinking a lot lately about the current state of AI…

Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks
05
May
2024

Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Palo Alto firewalls: CVE-2024-3400 exploitation…

A Checklist for What Every Online Coding Class for Kids Needs
04
May
2024

A Checklist for What Every Online Coding Class for Kids Needs

Parents everywhere are eager to sign up their kids for online coding classes to ensure they’re ready for life and…

Rediscovering Minesweeper in the Professional Arena
04
May
2024

Rediscovering Minesweeper in the Professional Arena

Do you remember the first time you stumbled upon Minesweeper online? It could be during a lazy afternoon at a…