Cyber threats and incidents

GNU Wget2 Vulnerability Allows Arbitrary File Overwrite

What happened A vulnerability in GNU Wget2 allows attackers to overwrite arbitrary...

Threat Actor Exploits FortiWeb Appliances to Deploy Sliver C2

What happened Threat actors exploited unpatched FortiWeb web application firewall appliances to...

Cyberattack Disrupts Higham Lane School Systems

What happened Higham Lane School in the UK suffered a cyberattack that...

WhatsApp Device Fingerprinting Technique Raises Privacy Concerns

What happened Researchers revealed that WhatsApp can be abused for device fingerprinting,...

GravityRAT Malware Gains Enhanced Remote Access Capabilities

What happened A new variant of GravityRAT malware has been identified with...

Popular

CISO Diaries: Stefano Pasotti on Cybersecurity as Strategy, Not Cost

Cybersecurity is often viewed through the lens of controls,...

Indiana’s CISO Spotlight: Leaders Securing the Hoosier State

Indiana's cybersecurity leadership spans financial services, manufacturing, healthcare, education,...

Securing Colorado’s Government from the Inside: A Public Sector Cybersecurity Feature

Government cybersecurity does not get the same headlines as...

The CISOs Protecting Colorado’s Students, Staff, and Institutional Data

Higher education sits in an uncomfortable position in cybersecurity....

Colorado’s CISO Spotlight: Leaders Securing the State’s Most Complex Environments

Colorado's cybersecurity leadership extends well beyond any single sector....