If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure…
Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at…
SOAPHound is an open-source data collection tool capable of enumerating Active Directory environments through the Active Directory Web Services (ADWS)…
Feb 08, 2024NewsroomCyber Espionage / Malware The North Korea-linked nation-state actor known as Kimsuky is suspected of using a previously…
The BlackSuit ransomware group has struck again, adding two new victims to its ever-growing list of targets. This time, the…
Six US government agencies have joined three international partners to warn that attackers from the Volt Typhoon threat group are…
Ransomware payments in 2023 soared above $1.1 billion for the first time, shattering previous records and reversing the decline seen…
Harnessing the Digital Scout for Cybersecurity’s Future By Darrin Straff, Senior Staffing Consultant, NinjaJobs Introduction: In the digital age, where…
A Vital Set of Cybersecurity Best Practices By John Funk, Creative Consultant, SevenAtoms A new cybersecurity mandate being rolled out…
In this Help Net Security interview, Anya Shpilman, Senior Executive, Cyber Security Services at WDigital, discusses the benefits and potential…
Many people use Safari as the pre-installed web browser on devices like Macs, iPhones, and iPads. Yet, the extent of…
The hacker group known as NoName has launched a cyber offensive targeting several prominent Spanish websites. Among the victims are…










