Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework
16
Dec
2023

Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework

By Michael Mumcuoglu, CEO & Co-Founder, CardinalOps As we approach the second half of a year punctuated by ransomware and…

Snatch Ransomware Group Claims The FDVA Cyber Attack
16
Dec
2023

A Year In Review – Biggest Cybersecurity Penalties In 2023

As the sun sets on 2023, the cybersecurity space bears the scars and triumphs of a year unlike any other….

Cybersecurity Is Changing: Is the Experience Positive or Negative?
16
Dec
2023

Cybersecurity Is Changing: Is the Experience Positive or Negative?

By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies Cybersecurity is Changing: Is the Experience Positive or Negative?…

Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023
16
Dec
2023

Navigating The Cybersecurity Horizon: Insights and Takeaways from Blackhat2023

Exploring the Future of Cybersecurity at BlackHat 2023 By Kylie M. Amison, Technical Reporter, Cyber Defense Magazine In our ever-evolving…

Holiday Gift Card Frauds
16
Dec
2023

The Rising Threat Behind Holiday Gift Card Frauds

Dec 16, 2023NewsroomOnline Security / Cybercrime Microsoft is warning of an uptick in malicious activity from an emerging threat cluster…

Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations
16
Dec
2023

Understanding The Impact of The SEC’s Cybersecurity Disclosure Regulations

By George Gerchow, CSO and SVP of IT, Sumo Logic Corporate security and compliance teams are scrambling to understand the…

Snatch Ransomware Group Claims The FDVA Cyber Attack
16
Dec
2023

A Chat With Roman Medina

The cybersecurity industry, particularly in the banking sector, is an ever-evolving domain, constantly challenged by new threats and technologies. In…

New NKAbuse malware abuses NKN decentralized P2P protocol
16
Dec
2023

New NKAbuse malware abuses NKN decentralized P2P protocol

New NKAbuse malware abuses NKN decentralized P2P network protocol Pierluigi Paganini December 16, 2023 Experts uncovered a new Go-based multi-platform…

Most API security strategies are underdeveloped. Let’s unpack that.
16
Dec
2023

Most API security strategies are underdeveloped. Let’s unpack that.

For attackers, Sun Tzu’s “The Art of War” has guidance on war strategy. For starters, “All warfare is based on…

Top 10 CISSP Stress-Busting Study Tips & Tricks
16
Dec
2023

Top 10 CISSP Stress-Busting Study Tips & Tricks

We all know that nervous feeling we get when we’re about to take a test. It’s normal to feel some…

Purposelessness—Not Social Media—is Causing Our Kids' Depression
16
Dec
2023

Purposelessness—Not Social Media—is Causing Our Kids’ Depression

Social media started around 2012, which is precisely when we saw our kids’ mental health drop into an abyss. But…

Locked bitcoin
16
Dec
2023

The Week in Ransomware – December 15th 2023

Today’s column brings you two weeks of information on the latest ransomware attacks and research after we skipped last week’s…