Name That Toon: Tug of War
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.…
Legacy Ivanti Cloud Service Appliance Being Exploited
CISA wants everyone—and government agencies in particular—to remove or upgrade an Ivanti Cloud Service Appliance (CSA) that is no longer…
Cybersecurity & the 2024 US Elections
While the 2024 election may see various cyber threats, existing security measures and coordination across all levels of government aim…
North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware
Cybersecurity researchers are continuing to warn about North Korean threat actors’ attempts to target prospective victims on LinkedIn to deliver…
Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution
A now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieve remote code execution…
Master Your PCI DSS v4 Compliance with Innovative Smart Approvals
The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger, businesses are scrambling to meet…
From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit?…
Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure
Apple has filed a motion to “voluntarily” dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk…