Resources

Resource Types
News

Threat Actors Exploit Zero Days Within 5 Days, Says Google’s Mandiant

Oct 17, 2024 | Google Mandiant’s analysis of 138 actively exploited vulnerabilities in 2023 reveals a concer

News

Basic Cyber Hygiene Still Offers the Best Defense Against Ransomware

Oct 17, 2024 | The FBI’s takedown of the Dispossessor ransomware gang highlights a critical truth: simple cy

News

Open-Source Entry Points Targeted for Supply Chain Compromise

Oct 15, 2024 | Threat actors are exploiting open-source environments like PyPI, npm, and Ruby Gems through c

News

Command-Jacking Used to Launch Malicious Code on Open-Source Platforms

Oct 14, 2024 | Attackers are exploiting entry points in open-source environments like PyPI and npm through c

News

Fidelity Investments Data Breach Impacts More Than 77,000 Customers

Oct 14, 2024 | Fidelity Investments disclosed a data breach affecting over 77,000 customers.

News

Black Lotus, Emotet, Beep, and Dark Pink: Top Malware Threats of 2024

Oct 15, 2024 | As 2024 closes, malware like Black Lotus, Emotet, Beep, and Dark Pink continue to evolve, exp

Image
News

CISA Adds Mitel, Oracle, flaws to the KEV list

January 10, 2025 | CISA has updated its Known Exploited Vulnerabilities (KEV) catalog with critical flaws in

News

Iranian "Dream Job" Campaign Targets Aerospace Sector

Nov 15, 2024 | Iranian threat group TA455 is using fake job offers to infiltrate the aerospace industry, acc

News

Zero-Day Exploits Surge in 2023: Cisco and Fortinet Under Fire

Nov 15, 2024 | In 2023, attackers increasingly targeted zero-day vulnerabilities, leveraging flaws in Citrix

Image
News

Sharing of Telegram User Data Surges After CEO Arrest – Critical Start

Jan. 7, 2025 | Telegram, once known for strict user privacy, shared data from 14 to 900 U.S.

News

Celebrating the 2024 Women in IT Security Honorees – SC Media

Nov 14, 2024 | Meet the extraordinary women driving innovation in cybersecurity.