MITRE Debuts ICS Threat Modeling for Embedded Systems News EMB3D, like ATT&CK and CWE, seeks to provide a common… rooter December 19, 2023 1 min read 0
Communicating with Impact: Tips for Discussing Cybersecurity Metrics with Boards News Metrics have a place when it comes to reporting on… rooter December 19, 2023 1 min read 0
Attackers Target Microsoft Accounts to Weaponize OAuth Apps News After compromising Azure and Outlook user accounts, threat actors are… rooter December 19, 2023 1 min read 0
Saudi Cyber Students Team with Bahrain to Assess AI Security & Risk News A visit to the "Island of Pearls" is part of… rooter December 19, 2023 1 min read 0
Confidential AI Protects Data and Models Across Clouds News Confidential AI integrates zero trust and confidential computing to guard… rooter December 19, 2023 1 min read 0
Hacktivists Interrupt UAE TV Streams With a Message About Gaza News The root cause may lie in set-top boxes run by… rooter December 19, 2023 1 min read 0
Software & Security: How to Move Supply Chain Security Up the Agenda News Getting more insight helps you to prioritize across all your… rooter December 19, 2023 1 min read 0
Ransomware Gangs Use PR Charm Offensive to Pressure Victims News Threat actors are fully embracing the spin machine: rebranding, speaking… rooter December 19, 2023 1 min read 0
Microsoft Gives Admins a Reprieve With Lighter-Than-Usual Patch Update News The company's final patch release for 2023 contained fixes for… rooter December 19, 2023 1 min read 0
Stamus Networks Supports NATO Red Teaming Cyber Exercise for the Fifth Consecutive Year News Twelfth annual Crossed Swords will see Stamus Networks share expertise… rooter December 19, 2023 1 min read 0