The Song Remains the Same: The 2023 Active Adversary Report for Security Practitioners
The remarkable decline in attacker dwell time is now well-documented, but what does that mean for those doing the hands-on…
The remarkable decline in attacker dwell time is now well-documented, but what does that mean for those doing the hands-on…
A threat cluster's switch from Vice Society to Rhysida
The CTO of MacPaw provides a case study in planning for cybersecurity and uptime in the face of armed conflict.
Christopher Wray tells the US Senate that more US infrastructure will be targeted for cyberattacks in the wake of the…
The future of the cybersecurity workforce will rely less on long-led legacy education models and more on skills-now training.
Atlassian CISO warns Confluence Data Center and Server customers they're vulnerable to "significant data loss" if all on-premises versions aren't…
Detection and incident response in a cloud environment can be a new challenge for security professionals who build their expertise…
Cybercriminals are upping their phishing with shortened links and showing that coveted, regulated top-level domains aren't as exclusive as you'd…
The parties within the International Counter Ransomware Initiative intend to use information-sharing tools and AI to achieve their goals of…
The wider availability of turnkey cyberattack kits in the criminal underground is leading to a glut of campaigns using remote…