Based on recent reports from Cyble, there has been a large attack vector for threat actors in the Solar industry’s...
Proofpoint, Inc. unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk—vulnerability, attacks, and privilege—and how the extraordinary events...
Lawmakers look to grow an already lengthy to-do list at the Cybersecurity and Infrastructure Security Agency. A bill giving the Cybersecurity and Infrastructure Security Agency authority...
The Energy Department has an obligation to protect both public and private energy interests on critical infrastructure. This year has been a pivotal year for malicious...
Security researchers have discovered a new class of DNS vulnerability that affects multiple DNS-as-a-Service (DNSaaS) providers. Researchers from cloud security firm Wiz.io discovered that non-standard implementation of DNS resolvers, when...
An open source tool designed to help organizations identify credential leaks was showcased publicly for the first time at Black Hat USA yesterday (August 4). Scrapesy, developed by...
The Pakistan Telecommunication Authority (PTA) has announced that a new cybersecurity policy and accompanying cybersecurity agency has been approved for the South Asian nation. The new...
A new Digital Shadows report reveals Initial Access Brokers (IABs) have consolidated their role in the cybercriminal landscape and have now become a central figure in...
The standards will help increase student cybersecurity literacy and build a robust pipeline of future cybersecurity talent CYBER.ORG announced the release of the nation’s first voluntary K-12...
The volume of cyber intrusion activity globally jumped 125% in the first half of 2021 compared with the same period last year, according to the Cyber...
As legendary management guru Peter Drucker said, “You can’t manage what you can’t measure.” For some business functions, such as sales and human resources, standard metrics...
Recent Comments