
North Korean fake IT workers up the ante in targeting tech firms
North Korean fake IT worker scams are evolving to incorporate theft and extortion as more examples […]

What CISOs need to know about the SEC’s breach disclosure rules
The US Securities and Exchange Commission’s (SEC) breach disclosure rules have placed increased responsibility on the […]

Act fast to snuff out employee curiosity over ‘free’ AI apps
The word “free” has always tempted employees who are looking for an app or template to […]

CSO30 ASEAN 2024: The top 30 cybersecurity leaders in Southeast Asia and Hong Kong
The fourth CSO30 ASEAN Awards programme recognises the top 30 cybersecurity leaders driving business value, demonstrating […]

How XDR Security Transforms Cyber Risk Management
Modern Threats Demand Modern Solutions In 2024, cyber threats are evolving fast. Attackers are using advanced […]

Erneute Phishing-Attacke auf IHK-Unternehmen
Hacker versuchen erneut an Daten von IHK-Unternehmen zu gelangen. janews – Shutterstock.com Cyberkriminelle lassen sich immer […]

Chinas Cyber-Pandas greifen Telekom-Unternehmen an
Setzt China im Rahmen seiner Belt and Road Initiative auf Cyberspionage? ndutfrea/shutterstock.com Dank des von ihm […]

Weaponized pen testers are becoming a new hacker staple
Malicious adaptations of popular red teaming tools like Cobalt Strike and Metasploit are causing substantial disruption, […]

11 biggest financial sector cybersecurity threats
The financial sector faces a wide array of serious security threats that will only increase as […]

Palo Alto Networks zero-day firewall flaws caused by basic dev mistakes
Palo Alto Networks has issued fixes for two actively exploited vulnerabilities that impact its firewalls and […]