
Resources
CRITICALSTART Unveils Mid-Year Cyber Threat Intelligence Report Highlighting Key Threats Disrupting Businesses
August 22, 2024 | Critical Start's latest Cyber Threat Intelligence Report reveals significant threats in the first half of 2
New Vulnerability Puts YubiKey 5 Devices at Risk
Sept 05, 2024 | A recently discovered flaw, "Eucleak," exposes YubiKey 5 devices with firmware below 5.7 to cloning attacks.
Expert Insights on National Insider Threat Awareness Month: Why It Matters for Cybersecurity
September 17, 2024 | National Insider Threat Awareness Month highlights the need to address insider risks—w
Critical Start Appoints New CEO as Part of Executive Transition
September 20, 2024 | Critical Start has appointed Scott White as its new CEO, succeeding founder Rob Davis,
NIST’s NICE: 3 Ways to Adapt the Hiring Framework for Modern Threats
Oct 31, 2024 | The NICE cybersecurity hiring framework is a solid foundation for building a security team bu

2024 Cyber Risk Report: 4 Key Takeaways
August 6, 2024 | The latest Cyber Risk Report shows a 16% rise in data breaches.
CyberTech Experts Address Cybersecurity Gaps in New MDR Report
August 13, 2024 | Cybersecurity leaders are grappling with a surge in attacks in 2024, highlighting the pressing need for pro
Authentication Bypass Discovered in Microsoft Entra ID
August 21, 2024 | A vulnerability in Microsoft Entra ID (formerly Azure AD) allows attackers to bypass security measures via
Planned Parenthood Confirms Cyberattack by RansomHub
Sept 05, 2024 | Planned Parenthood has confirmed a cyberattack on its Montana organization, forcing parts of
Tapping Into Asset Visibility for Enhanced MDR Outcomes
September 16, 2024 | Asset visibility is key to improving Managed Detection and Response (MDR) outcomes.
N-able: Cyberattacks on Microsoft 365 Security Surge 56%
September 20, 2024 | N-able's new report reveals a 56% rise in cyberattacks on Microsoft 365 in 2024.
FakeCall Android Trojan Evolves with New Evasion Tactics – SecurityWeek
Oct 30, 2024 | The FakeCall Android trojan has adopted advanced evasion and surveillance techniques, heighte