Why Identity Teams Need to Start Reporting to the CISO
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it's…
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it's…
The RansomHub ransomware gang is behind the recent cyberattack on oil and gas services giant Halliburton, which disrupted the company's IT…
Public-facing vulnerabilities, cloud sprawl, access to back-end servers are just a few of the challenges travel and hospitality companies must…
Since surfacing in February 2024, RansomHub ransomware affiliates have breached over 200 victims from a wide range of critical U.S.…
As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According…
As cloud environments continue to expand, so do the threats targeting them. In today’s fast-paced digital world, attacks on cloud…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several…
The Corona Mirai-based malware botnet is spreading through a 5-year-old remote code execution (RCE) zero-day in AVTECH IP cameras, which…
A former core infrastructure engineer at an industrial company headquartered in Somerset County, New Jersey, was arrested after locking Windows admins…
The APT33 Iranian hacking group has used new Tickler malware to backdoor the networks of organizations in the government, defense,…