Most Disclosed ICS Vulnerabilities are Low Complexity
Past four years sees surge in ICS vulnerability disclosures with most vulnerabilities of low complexity Read More
#CCSE22: Why Are Organizations Getting Zero Trust “Wrong”?
A star-studded panel discussion explored implementing zero trust and reducing overall risk Read More
US legislation brings mandatory cyberattack and ransomware reporting one step closer
New legislation, unanimously passed by the US Senate could - amongst other things - require organisations working in critical industry sectors to alert the US...
Smashing Security podcast #264: Hacked car chargers, Telegram sextortionists, and secret bossware
Why might Russian EV chargers be displaying an anti-Putin message? Why are Telegram groups sharing sharing explicit images of women without their consent? And who...
CNAPP: What Is It and Why Is It Important for Security Leaders?
A Cloud-Native Application Protection Platform (CNAPP) offers four key benefits to reduce risk and improve visibility. Here’s what you need to know. The cloud security...
#CCSE22: The Latest Cybersecurity Workforce Trends
ISC(2) provided a deepdive insight into the current state of the cybersecurity workforce Read More
Details of an NSA Hacking Operation
Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013,...
Purported massive leak of Russian soldiers’ data could sink morale, digital security
In what security experts say is an unprecedented wartime leak, Ukrainian newspaper Ukrayinska Pravda published what it claims are the personal details of 120,000 Russian...
Staying safe online when you live off-grid
This blog was written by an independent guest blogger. Over 250,000 people in the US live off the grid, meaning they do not rely on...
Vulnerability Exploit Attempts Surge Tenfold Against Ukrainian Websites
Thirty Ukrainian university sites compromised during first days of invasion Read More