Car Dealership Employees Begin Legal Case Following Breach
Law firm says clients have been left in the dark for over six months Read More
Responding to heightened cyberattack risk: Focus on the basics
A SANS Institute webcast about Russian cyberattack escalations in Ukraine presented a couple of takeaways. The first: Don’t panic. Too often with security issues we...
Chinese APT41 Group Compromises Six US Government Networks
Group exploited Log4Shell “within hours,” says Mandiant Read More
Microsoft Fixes 71 Bugs Including Three Zero Days
None were reported as being exploited in the wild Read More
Internet Backbone Giant Lumen Shuns .RU
Lumen Technologies, an American company that operates one of the largest Internet backbones and carries a significant percentage of the world’s Internet traffic, said today...
8 Tips for Staying Safe from Ransomware Attacks
What is Ransomware? Over the past year, you may have seen the term ransomware popping up frequently. There’s good reason for that as ransomware is...
8 Tips for Staying Safe from Ransomware Attacks
What is Ransomware? Over the past year, you may have seen the term ransomware popping up frequently. There’s good reason for that as ransomware is...
New attack bypasses hardware defenses for Spectre flaw in Intel and ARM CPUs
The hardware-based mitigations introduced in Intel and ARM CPUs over the past few years to fix a serious flaw called Spectre are not as strong...
What is XSS? Cross-site scripting attacks explained
Cross-site scripting (XSS) is a cyberattack in which a hacker enters malicious code into a web form or web application url. This malicious code, written...
International Women’s Day: Career Advice from Women in Tech
At the Center for Internet Security (CIS), we are proud to have so many talented, passionate, and knowledgeable employees on our team. Their efforts have...