Why Identity Teams Need to Start Reporting to the CISO
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it’s…
Identity illuminated
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it’s…
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected…
Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent…
Cisco’s deal to acquire Robust Intelligence will make it possible to use red-team algorithms to assess risk in AI models…
Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that disguises itself…
The most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at…
Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to…
A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of…
Chinese-speaking users are the target of a “highly organized and sophisticated attack” campaign that is likely leveraging phishing emails to…
Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry,…