Attackers are exploiting vulnerabilities at a record pace—here’s what to do about it
“Another day, another vulnerability” is a familiar refrain among security teams worldwide. One of the most […]
Thousands of abandoned PyPI projects could be hijacked: Report
A vulnerability in abandoned Python open source repository projects could allow over 20,000 packages of code […]
Building a Culture of Email Security Awareness
Human error remains a significant risk for organizations when it comes to cyber threats. In fact, […]
6 things hackers know that they don’t want security pros to know that they know
Security professionals have good insights into the technical tactics, techniques, and procedures (TTPs) that threat actors […]
WeSecureApp is Now Strobes: A Message from Our CEO
Hello everyone, I’m excited to share some big news with you today. WeSecureApp is evolving into […]
Cloud providers must own up to their part in the current state of insecurity
The shared responsibility model has been foundational to cybersecurity from the start. But modern developments and […]
How to ensure cybersecurity strategies align with the company’s risk tolerance
Aligning an organization’s appetite for risk with cybersecurity strategies is a critical challenge CISOs face, one […]
North Korean hackers actively exploited a critical Chromium zero-day
A zero-day flaw in open source browser, Chromium, which was patched recently, was exploited by a […]
Ransomware recovery: 8 steps to successfully restore from backup
According to a Sophos survey of 5,000 IT and cybersecurity leaders released in April, 59% of […]
Women in Cyber Day finds those it celebrates ‘leaving in droves’
The information security industry has been trying for years to improve the participation of and respect […]