News

  • #RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds

    A new report by Cato Networks found that exploiting old vulnerabilities in unpatched systems is one of threat actors’ favorite initial access vectors Read More

    Read More

  • New Attack on VPNs

    This attack has been feasible for over two decades: Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering. TunnelVision, as the researchers have named their attack, largely negates…

    Read More

  • Ransomware Strikes Wichita, Services Disrupted

    Online payment systems, such as those for water bills and court citations, are still offline Read More

    Read More

  • LockBit Leader aka LockBitSupp Identity Revealed

    Russian national Dmitry Yuryevich Khoroshev is behind the LockBitSupp persona, law enforcement revealed Read More

    Read More

  • #RSAC: Three Battle-Tested Tips for Surviving a Cyber-Attack

    CISOs share their experience of managing real-life cyber incidents provide their recommendations to survive cyber-attacks Read More

    Read More

  • CIS Benchmarks Community Volunteer Spotlight: Bruce Bading

    CIS relies on a global community of IT security professionals to ensure that the CIS Benchmarks provide independent, vendor-agnostic security guidance. These volunteers provide their expertise for the benefit of all those who seek to use the internet to interact with the world safely and securely online. Bruce F. Bading, President, BFB Consulting, Inc., has…

    Read More

  • Report Shows AI Fraud, Deepfakes Are Top Challenges For Banks

    Mitek surveyed 1500 financial services risk and innovation professionals in UK, US and Spain Read More

    Read More

  • How to Report Identity Theft to Social Security

    In the hands of a thief, your Social Security Number is the master key to your identity.  With a Social Security Number (SSN), a thief can unlock everything from credit history and credit line to tax refunds and medical care. In extreme cases, thieves can use it to impersonate others. So, if you suspect your number is lost or stolen, it’s important to report identity theft to Social Security right away.  Part of what makes an…

    Read More

  • CIS Controls Volunteer Spotlight: Randy Marchany

    Randy Marchany has been a CIS Controls Community member since the beginning. Hear what he’s learned in his 24 years of volunteering with CIS. Read More

    Read More

  • 2024 Cyber Resilience Research Reveals a Complex Terrain

    New data helps business leaders understand how and why to prioritize resilience. In the ever-evolving landscape of digital innovation, businesses find themselves at the intersection of progress and peril. The data reveals that the tradeoffs are not just dramatic, but they also put the organization at significant risk. One of the primary obstacles is the…

    Read More