New Regulations Make D&O Insurance a Must for CISOs News CISOs currently hold all of the responsibility to stop cyberattacks… rooter March 25, 2024 1 min read 0
‘PhantomBlu’ Cyberattackers Backdoor Microsoft Office Users via OLE News The cyber campaign uses social engineering and sophisticated evasion tactics,… rooter March 25, 2024 1 min read 0
The New CISO: Rethinking the Role News Rising cybersecurity demands are changing the role of the head… rooter March 25, 2024 1 min read 0
‘Conversation Overflow’ Cyberattacks Bypass AI Security to Target Execs News Credential-stealing emails are getting past artificial intelligence's "known good" email… rooter March 25, 2024 1 min read 0
North Korea-Linked Group Levels Multistage Cyberattack on South Korea News Kimsuky-attributed campaign uses eight steps to compromise systems — from… rooter March 25, 2024 1 min read 0
ML Model Repositories: The Next Big Supply Chain Attack Target News Machine-learning model platforms like Hugging Face are suspectible to the… rooter March 25, 2024 1 min read 0
Chinese APT ‘Earth Krahang’ Compromises 48 Gov’t Orgs on 5 Continents News The group uses pretty standard open source tooling and social… rooter March 25, 2024 1 min read 0
AWS zero trust: A CISO’s path to improved cloud visibility & control Cyber Security EXECUTIVE SUMMARY: It’s undisputed — the cloud has transformed how… rooter March 25, 2024 4 min read 0
Top 4 Industries at Risk of Credential Stuffing and Account Takeover (ATO) attacks Security All industries are at risk of credential stuffing and account… rooter March 25, 2024 5 min read 0
Green Business 101: How to Make Your Company Eco-Friendly Cyber Security In this post, I will talk about Green Business and… rooter March 25, 2024 1 min read 0