Cyber threats and incidents

UK Government Resets Cyber Action Plan After Policy Failures

What happened The UK government cyber action plan is being reset following...

Jaguar Land Rover Sales Impacted by Cyberattack

What happened Jaguar Land Rover reported a fiscal Q3 sales slump following...

Active Exploitation Hits Legacy D-Link DSL Routers

What happened An active exploitation campaign targets legacy D-Link DSL routers, using...

Unpatched Firmware Flaw Exposes TOTOLINK EX200 Routers to Remote Takeover

What happened An unpatched firmware flaw in TOTOLINK EX200 routers allows full...

AdonisJS Vulnerability Allows Remote File Writing on Servers

What happened The AdonisJS vulnerability allows remote attackers to write files on...

Popular

CISO Diaries: Stefano Pasotti on Cybersecurity as Strategy, Not Cost

Cybersecurity is often viewed through the lens of controls,...

Indiana’s CISO Spotlight: Leaders Securing the Hoosier State

Indiana's cybersecurity leadership spans financial services, manufacturing, healthcare, education,...

Securing Colorado’s Government from the Inside: A Public Sector Cybersecurity Feature

Government cybersecurity does not get the same headlines as...

The CISOs Protecting Colorado’s Students, Staff, and Institutional Data

Higher education sits in an uncomfortable position in cybersecurity....

Colorado’s CISO Spotlight: Leaders Securing the State’s Most Complex Environments

Colorado's cybersecurity leadership extends well beyond any single sector....