
Resources
Latrodectus Malware: The Stealth Phishing Threat to Critical Sectors – SC Media
Nov 11, 2024 | Emerging in 2023, Latrodectus malware targets critical sectors like finance, healthcare, and
A Blueprint for Fighting Ransomware in 2025
Jan 23, 2025 | Ransomware groups are evolving, with AI-powered threats and aggressive extortion tactics resh
Malicious PyPI Package Steals AWS Credentials: A Long-Term Supply Chain Threat
Nov 11, 2024 | Cybersecurity researchers have uncovered a malicious PyPI package, "fabrice," exfiltrating AW
Always-on Defense: The Critical Role of Monitoring in Manufacturing Cyber Protection
Nov 11, 2024 | Cyberattacks on manufacturing are rising, targeting legacy systems and interconnected network
CISOs Concerned Over Growing Demands of Their Role – DICE Insights
Nov 18, 2024 | With cybersecurity threats growing in complexity, 84% of CISOs advocate splitting their role
Threat Actors Exploit Zero Days Within 5 Days, Says Google’s Mandiant
Oct 17, 2024 | Google Mandiant’s analysis of 138 actively exploited vulnerabilities in 2023 reveals a concer
Basic Cyber Hygiene Still Offers the Best Defense Against Ransomware
Oct 17, 2024 | The FBI’s takedown of the Dispossessor ransomware gang highlights a critical truth: simple cy
Open-Source Entry Points Targeted for Supply Chain Compromise
Oct 15, 2024 | Threat actors are exploiting open-source environments like PyPI, npm, and Ruby Gems through c
Command-Jacking Used to Launch Malicious Code on Open-Source Platforms
Oct 14, 2024 | Attackers are exploiting entry points in open-source environments like PyPI and npm through c
Fidelity Investments Data Breach Impacts More Than 77,000 Customers
Oct 14, 2024 | Fidelity Investments disclosed a data breach affecting over 77,000 customers.
Black Lotus, Emotet, Beep, and Dark Pink: Top Malware Threats of 2024
Oct 15, 2024 | As 2024 closes, malware like Black Lotus, Emotet, Beep, and Dark Pink continue to evolve, exp

CISA Adds Mitel, Oracle, flaws to the KEV list
January 10, 2025 | CISA has updated its Known Exploited Vulnerabilities (KEV) catalog with critical flaws in