Innovator Spotlight: SNYK
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to…
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to…
Ransomware attacks and email-based fraud account for 80% to 90% of all claims processed by cyber insurers, but a handful…
Since surfacing in February 2024, RansomHub ransomware affiliates have breached over 200 victims from a wide range of critical U.S.…
As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According…
As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud…
In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several…
The Corona Mirai-based malware botnet is spreading through a 5-year-old remote code execution (RCE) zero-day in AVTECH IP cameras, which…
An Iran-based hacking group known as Pioneer Kitten is breaching defense, education, finance, and healthcare organizations across the United States…
Interview with Dr. Wade Holmes, member, Cyversity Board of Directors Cyversity is a 501(c)(3) organization whose mission is to achieve…