Resources

Resource Types
News

Latrodectus Malware: The Stealth Phishing Threat to Critical Sectors – SC Media

Nov 11, 2024 | Emerging in 2023, Latrodectus malware targets critical sectors like finance, healthcare, and

News

A Blueprint for Fighting Ransomware in 2025

Jan 23, 2025 | Ransomware groups are evolving, with AI-powered threats and aggressive extortion tactics resh

News

Malicious PyPI Package Steals AWS Credentials: A Long-Term Supply Chain Threat

Nov 11, 2024 | Cybersecurity researchers have uncovered a malicious PyPI package, "fabrice," exfiltrating AW

News

Always-on Defense: The Critical Role of Monitoring in Manufacturing Cyber Protection

Nov 11, 2024 | Cyberattacks on manufacturing are rising, targeting legacy systems and interconnected network

News

CISOs Concerned Over Growing Demands of Their Role – DICE Insights

Nov 18, 2024 | With cybersecurity threats growing in complexity, 84% of CISOs advocate splitting their role

News

Threat Actors Exploit Zero Days Within 5 Days, Says Google’s Mandiant

Oct 17, 2024 | Google Mandiant’s analysis of 138 actively exploited vulnerabilities in 2023 reveals a concer

News

Basic Cyber Hygiene Still Offers the Best Defense Against Ransomware

Oct 17, 2024 | The FBI’s takedown of the Dispossessor ransomware gang highlights a critical truth: simple cy

News

Open-Source Entry Points Targeted for Supply Chain Compromise

Oct 15, 2024 | Threat actors are exploiting open-source environments like PyPI, npm, and Ruby Gems through c

News

Command-Jacking Used to Launch Malicious Code on Open-Source Platforms

Oct 14, 2024 | Attackers are exploiting entry points in open-source environments like PyPI and npm through c

News

Fidelity Investments Data Breach Impacts More Than 77,000 Customers

Oct 14, 2024 | Fidelity Investments disclosed a data breach affecting over 77,000 customers.

News

Black Lotus, Emotet, Beep, and Dark Pink: Top Malware Threats of 2024

Oct 15, 2024 | As 2024 closes, malware like Black Lotus, Emotet, Beep, and Dark Pink continue to evolve, exp

Image
News

CISA Adds Mitel, Oracle, flaws to the KEV list

January 10, 2025 | CISA has updated its Known Exploited Vulnerabilities (KEV) catalog with critical flaws in