ISACA CEO Hails Europe as a Lighthouse of Capability
ISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy
Cyber News, Cyber Threat TrendsISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy
Cyber News, Cyber Threat TrendsISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy
Cyber News, Cyber Threat TrendsISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy
Cyber News, Cyber Threat TrendsOne of the oldest malware tricks in the book — hacked websites claiming visitors need to update their Web browser before they can view any content — has roared back to life in the past few months. New research shows the attackers behind one such scheme have developed an ingenious way of keeping their malware […]
Cyber NewsAmnesty International has published a comprehensive analysis of the Predator government spyware products. These technologies used to be the exclusive purview of organizations like the NSA. Now they’re available to every country on the planet—democratic, nondemocratic, authoritarian, whatever—for a price. This is the legacy of not securing the Internet when we could have.
Cyber News, Cyber Threat TrendsIn the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within organizational environments. They don’t just target single weaknesses; they’re on the hunt for combinations of exposures and attack methods that can lead them to their desired objective. Despite the presence of numerous security tools, organizations often have to deal with […]
Cyber News, Cyber Threat TrendsA threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks in a two-fold attempt to illicitly mine cryptocurrency and breach cloud environments. Dubbed Qubitstrike by Cado, the intrusion set utilizes Telegram API to exfiltrate cloud service provider credentials following a successful compromise. “The payloads for the Qubitstrike campaign are
Cyber News, Cyber Threat TrendsWe’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Retail. The report examines the edge ecosystem, surveying retail IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report. Last year’s focus on retail […]
Cyber News, Cyber Threat TrendsThe CISO Survival Guide explores the complex and shifting challenges, perceptions, and innovations that will shape how organizations securely expand in the future.
Cyber News, Cyber Threat Trends