Expect to Fail: How Organizations Can Benefit from a Breach
By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…
By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…
By Aaron Bray, CEO. Phylum Cybersecurity has changed dramatically in the last four years. During the pandemic, organizations around the…
Crypto hackers gained control of a phone number associated with the government agency's account after MFA was disabled in July.
Ivanti warned admins to stop pushing new device configurations to appliances after applying mitigations because this will leave them vulnerable…
An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional…
CISA issued this year's first emergency directive ordering Federal Civilian Executive Branch (FCEB) agencies to immediately mitigate two Ivanti Connect…
The Charming Kitten-related cyber-espionage group is posing as legitimate journalists and researchers to get intel on the Israel-Hamas war.
Ambient light sensors on smart-device screens can effectively be turned into a camera, opening up yet another path to snooping…
A Canadian man who says he's been falsely charged with orchestrating a complex e-commerce scam is seeking to clear his…
Learn how threat actors utilize credentials to break into privileged IT infrastructure to create data breaches and distribute ransomware. [...]