Microsoft on CISOs: Thriving Community Means Stronger Security
Microsoft execs detailed the company’s reaction to the CrowdStrike incident and emphasized the value of a collective identity. Microsoft execs…
University Professors Targeted by North Korean Cyber Espionage Group
The North Korea-linked threat actor known as Kimsuky has been linked to a new set of attacks targeting university staff,…
0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices
Cybersecurity researchers have discovered a new “0.0.0.0 Day” impacting all major web browsers that malicious websites could take advantage of…
Building an Effective Strategy to Manage AI Risks
As AI technologies continue to advance at a rapid pace, privacy, security and governance teams can’t expect to achieve strong…
SaaS Apps Present an Abbreviated Kill Chain for Attackers
Black Hat presentation reveals adversaries don’t need to complete all seven stages of a traditional kill chain to achieve their…
Automated Security Validation: One (Very Important) Part of a Complete CTEM Framework
The last few years have seen more than a few new categories of security solutions arise in hopes of stemming…
Critical AWS Vulnerabilities Allow S3 Attack Bonanza
Researchers at Aqua Security discovered the “Shadow Resource” attack vector and the “Bucket Monopoly” problem, where threat actors can guess…
New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links
Cybersecurity researchers have discovered a novel phishing campaign that leverages Google Drawings and shortened links generated via WhatsApp to evade…