A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start. …
A favorite post-exploitation tool continues to gain sophistication, with one recent example adding disguised log-in pages, credential stealing, and information gathering via services such as VirusTotal….
IBM joins Crowdstrike and Microsoft is releasing AI models to cloud-native SIEM platforms….
A pervasive ClearFake campaign targeting Windows systems with Atomic Stealer has expanded its social engineering scams to MacOS users, analysts warn….
Stay away from using these tactics when trying to educate employees about risk….
New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order to get their devices approved for market. …
Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics….
The library said that it expects many of its services to be restored in the forthcoming weeks….
Academics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils….
Rackspace’s 2022 ransomware attack only continue to mount, with lawsuits in the offing — and show the long-tail costs of a cyberattack. …
While China is already among the world’s most formidable threat actors, a focus on exploiting public-facing appliances makes its state-sponsored APTs more dangerous than ever….
The influx of generative AI could cause security leaders to learn new skills and defensive tactics….
The state said 1.3 million individuals have been affected by this breach, which includes Social Security numbers and taxpayer information….