Upcoming Events

Ransomware Damage Claims Driving Insurance Hikes
the latest statistics from the Council of Insurance Agents and Brokers reported a 25.5% increase in cyber insurance cost...Read more

The 5 Stages of a Credential Stuffing Attack
great overview of credential stuffing including its stages...Read more

Why Is Cyber Assessment So Important in Security?
All the pentesting exercises in the world won't help unless an org has a complete & accurate understanding of its assets...Read more

The rising threat of cyber criminals targeting cloud infrastructure in 2022
combating threats is like playing endless hyper-advanced, multidimensional Whack-A-Mole: new threats are always emerging...Read more

New Cyberattack Campaign Uses Public Cloud Infrastructure to Spread RATs
An attack campaign detected in October delivers variants of Nanocore, Netwire, and AsyncRATs to target user data....Read more

Widespread, Easily Exploitable Windows RDP Bug Opens Users to Data Theft
Most Windows versions are at risk of remote, unprivileged attackers abusing RDP from the inside to hijack smart cards...Read more

US Police Warn of Parking Meters with Phishing QR Codes
Think before scanning the payment QR code on the meter; it may be an attempt by fraudsters to phish financial info...Read more

FBI: Cyber criminals are mailing out USB drives that install ransomware
Don't insert USB drives from unknown sources, even if they're addressed to you in the post....Read more

Chinese APT Hackers Used Log4Shell Exploit to Target Academic Institution
The state-sponsored group is believed to have been operating since mid-2020 in pursuit of intelligence collection...Read more

Businesses need to stop thinking that ransomware is different from other attacks
Orgs are in danger of allowing the spectre of ransomware attacks to distract them from keeping up with general security...Read more

Steal These Use Cases: 2021's Technology Wins in the Enterprise
It’s helpful to look at how other companies implemented a technology to learn from their victories and their mistakes....Read more

Ransomware and terrorism: For security pros the threat is equal
Report finds 60% of security pros believe ransomware threats should be prioritized at the same level as terrorism...Read more

LastPass says unauthorized access alerts were sent out in error
LastPass accidentally scared users witless with false breach alerts...Read more

Mitigating Log4Shell and Other Log4j-Related Vulnerabilities
Malicious cyberactors are actively scanning networks to exploit CVE-2021-44228, CVE-2021-45046, and CVE-2021-45105...Read more