Cyber threats and incidents

New China-Linked Hacker Campaign Exploits Edge Devices in Telco Breaches

What happened New China-Linked Hacker Campaign Exploits Edge Devices in Telco Breaches...

6 CISOs to Watch in Legal Services & Law Firms

Law firms are high-value targets for cyberattacks, handling sensitive client data,...

BlueDelta Hackers Target Microsoft OWA and Related Portals with Credential Harvesting

What happened BlueDelta hackers, a state-linked Russian intelligence group, intensified credential-harvesting campaigns using fraudulent...

Chinese Hackers Deploy NFC-Enabled Android Malware

What happened Chinese hackers deployed NFC-enabled Android malware capable of spreading via...

CrazyHunter Ransomware Attacking Healthcare Sector

What happened CrazyHunter ransomware targeted hospitals and healthcare providers by exploiting phishing...

Popular

CISO Diaries: Stefano Pasotti on Cybersecurity as Strategy, Not Cost

Cybersecurity is often viewed through the lens of controls,...

Indiana’s CISO Spotlight: Leaders Securing the Hoosier State

Indiana's cybersecurity leadership spans financial services, manufacturing, healthcare, education,...

Securing Colorado’s Government from the Inside: A Public Sector Cybersecurity Feature

Government cybersecurity does not get the same headlines as...

The CISOs Protecting Colorado’s Students, Staff, and Institutional Data

Higher education sits in an uncomfortable position in cybersecurity....

Colorado’s CISO Spotlight: Leaders Securing the State’s Most Complex Environments

Colorado's cybersecurity leadership extends well beyond any single sector....