Cyber threats and incidents

Critical FortiSIEM Vulnerability Lets Attackers Execute Arbitrary OS Commands Over TCP

What happened A critical FortiSIEM vulnerability lets attackers execute arbitrary OS commands...

Critical Command Injection Flaw in Spring CLI VSCode Extension Risks Local System Compromise

What happened A critical command injection flaw in the Spring CLI VSCode...

Elastic Security Updates Address Arbitrary File Access and Denial-of-Service Flaws

What happened Elastic security updates address arbitrary file access and denial-of-service flaws...

Widespread Web Skimming Campaign Hijacks Checkout Pages to Steal Credit Cards

What happened A widespread web skimming campaign hijacks checkout pages to steal...

Multi-Stage Windows Malware Uses PowerShell and Text Files to Deliver Payloads

A multi-stage Windows malware uses text-based payloads to invoke a PowerShell...

Popular

CISO Diaries: Stefano Pasotti on Cybersecurity as Strategy, Not Cost

Cybersecurity is often viewed through the lens of controls,...

Indiana’s CISO Spotlight: Leaders Securing the Hoosier State

Indiana's cybersecurity leadership spans financial services, manufacturing, healthcare, education,...

Securing Colorado’s Government from the Inside: A Public Sector Cybersecurity Feature

Government cybersecurity does not get the same headlines as...

The CISOs Protecting Colorado’s Students, Staff, and Institutional Data

Higher education sits in an uncomfortable position in cybersecurity....

Colorado’s CISO Spotlight: Leaders Securing the State’s Most Complex Environments

Colorado's cybersecurity leadership extends well beyond any single sector....