The attack involved use of a new version of Industroyer tool for manipulating industrial control systems.
Read moreHow Do I Conduct a Resilience Review?
April 12 2022As the first step, make sure that all business-critical data across your organization is protected.
Read moreRaidForums Get Raided, Alleged Admin Arrested
April 12 2022The U.S. Department of Justice (DOJ) said today it seized the website and user database for RaidForums, an extremely popular English-language cybercrime forum that sold access to more than...
Read moreOpen source code continues its steady takeover of codebases, and organizations have made slight gains in eliminating out-of-date and vulnerable components.
Read moreFortunately, we're not talking about a robot revolution, or about hospital AI run amuck. But these bugs could lead to ransomware, or worse...
Read moreJohn Oliver on Data Brokers
April 12 2022John Oliver has an excellent segment on data brokers and surveillance capitalism.
Read moreLike zero trust, the cybersecurity mesh re-envisions the perimeter at the identity layer and centers upon unifying disparate security tools into a single, interoperable ecosystem.
Read moreThe software supply chain security tool from GitHub and Google uses GitHub Actions and Sigstore to generate a "tamper-proof" record describing where, when, and how the software is produced.
Read moreFormer DHS employees targeted confidential, proprietary software and personally identifying information (PII) for hundreds of thousands of federal employees.
Read moreIn Appreciation: Mike Murray
April 11 2022Security industry expert who spearheaded healthcare cybersecurity efforts passes away at age 46.
Read more
Recent Comments