Israeli Cybersecurity Startups: Impact of a Growing Conflict
The deadly Oct. 7th attacks on Israel by Hamas, an Islamist organization which rules the Gaza Strip and has been designated a terrorist organization by Read More
The deadly Oct. 7th attacks on Israel by Hamas, an Islamist organization which rules the Gaza Strip and has been designated a terrorist organization by Read More
North Korea’s Kimsuky advanced persistent threat (APT) continues to evolve its attack methods and grow in sophistication, expanding its ability to control victims’ systems with Read More
Taiwan-based network equipment vendor D-Link this week confirmed that it was the victim of a recent data breach, but dismissed the seeming perpetrator’s claims about Read More
Two North Korean state-backed threat groups, whom Microsoft is tracking as Diamond Sleet and Onyx Sleet, are actively exploiting CVE-2023-42793, a critical remote code execution Read More
The hacktivist group SiegedSec has claimed responsibility for a series of attacks against Israeli infrastructure and industrial control systems (ICS), but there is no indication Read More
If there’s something all security operations (SecOps) teams need, but few get right, it is the ability to use security data analytics effectively. After all, Read More
Several countries in Europe as well as the United States and Japan were involved in the operation, which is aimed at defanging one of the Read More
State-sponsored threat actors from Russia and China continue to throttle the remote code execution (RCE) WinRAR vulnerability in unpatched systems to deliver malware to targets. Read More
Cybercriminals are stealing medical records from plastic surgery offices to extort doctors and patients. On Oct. 17, the FBI published a rather bespoke public service Read More
An incident response tabletop exercise is a discussion-based practice that uses a hypothetical situation to coach a technical or executive audience through the cybersecurity incident Read More