How CISOs can master the art of cyber security storytelling
EXECUTIVE SUMMARY: Powerful stories can mean the difference between stagnant security that incites adverse outcomes and 10X better security that…
EXECUTIVE SUMMARY: Powerful stories can mean the difference between stagnant security that incites adverse outcomes and 10X better security that…
The RansomHub ransomware group added the American telecommunications company Frontier Comunications to the list of victims on its Tor leak…
Resecurity uncovered a cybercriminal group that is providing a sophisticated phishing kit, named V3B, to target banking customers in the…
North Korea's newest threat actor uses every trick in the nation-state APT playbook, and most of cybercrime's tricks, too. It…
The political consultant who wrote the script and paid for the deepfake audio used in robocalls was fined $6 million…
Corporate admins should patch the max-severity CVE-2024-23108 immediately, which allows unauthenticated command injection.
Researchers went in-depth on an attack by the threat group, which mainly targets US companies in the education and industrial…
It's time to rethink the pivotal role incentives play in shaping behavior to find and disclose software vulnerabilities. More accurate…
Targeting India's government, defense, and aerospace sectors, the cyber-threat group now attacks Linux as well as Windows in its quest…
In attacks over the past three months, threat actors have exploited more than 80 vulnerabilities to accelerate distribution of the…