By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…
By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s…
The Blackwood APT is using the NSPX30 backdoor in cyberespionage attacks against individuals and companies in China, Japan, and the…
Medieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward to the digital age, and…
The Akira ransomware gang has claimed responsibility for a cyber attack on the systems of UK-headquartered cosmetics manufacturer and retailer…
Watch out, experts warn of a critical flaw in Jenkins Pierluigi Paganini January 26, 2024 Jenkins maintainers addressed several security…
Cisco Unified Communications and Contact Center Solutions, known for their robustness, have recently been under scrutiny due to a critical…
By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today….
In order to obtain unauthorized access and control, hackers take advantage of software vulnerabilities by manipulating updates. By corrupting the…
Jan 26, 2024NewsroomMalvertising / Phishing-as-a-service Chinese-speaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram…
“In like a lion, out like a lamb” is an accurate description of 2023. It was a challenging start to…
Growing environmental, social, and governance (ESG) expectations and expanding global regulation are propelling organizations to consider implementing a stand-alone human…











