Cyber threats and incidents

Everest Hacking Group Claims Breach of Nissan Motors

What happened Everest hacking group claims breach of Nissan Motors after the...

Critical zlib untgz Buffer Overflow Vulnerability

What happened Critical zlib untgz buffer overflow vulnerability was disclosed in the...

28 IPs and 85 Domains Hosting Carding Markets Uncovered

What happened New Research Uncovers 28 IPs and 85 Domains Hosting Carding...

New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits

What happened New ‘Penguin’ pig butchering as a service selling PII, stolen...

New EDRStartupHinder Tool Blocks Antivirus and EDR Services at Startup on Windows 11

What happened New EDRStartupHinder tool blocks antivirus and EDR services at startup...

Popular

CISO Diaries: Stefano Pasotti on Cybersecurity as Strategy, Not Cost

Cybersecurity is often viewed through the lens of controls,...

Indiana’s CISO Spotlight: Leaders Securing the Hoosier State

Indiana's cybersecurity leadership spans financial services, manufacturing, healthcare, education,...

Securing Colorado’s Government from the Inside: A Public Sector Cybersecurity Feature

Government cybersecurity does not get the same headlines as...

The CISOs Protecting Colorado’s Students, Staff, and Institutional Data

Higher education sits in an uncomfortable position in cybersecurity....

Colorado’s CISO Spotlight: Leaders Securing the State’s Most Complex Environments

Colorado's cybersecurity leadership extends well beyond any single sector....