Cybersecurity Blog
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on ...
Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases
Apr 23, 2024NewsroomEnd-to-End Encryption / Privacy European Police Chiefs said that the complementary partnership ...
German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies
Apr 23, 2024NewsroomCounterintelligence / National Security German authorities said they have issued arrest warrants ...
Feds Issue Guide for Change Health Breach Reporting Duties
Breach Notification , Healthcare , HIPAA/HITECH HHS OCR Says the Company Has Not Yet Filed HIPAA Breach Reports to the ...
GitLab Affected by GitHub-Style CDN Flaw Allowing Malware Hosting
Similar to a recently reported issue in GitHub, users can abuse the “comments” feature in GitLab to upload ...
Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity – Help Net Security
Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events ...
GitHub Comments Abused to Push Malware via Microsoft Repository URLs
A GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using URLs ...
Majority of businesses worldwide are implementing zero trust, Gartner finds
Dive Brief: Almost two-thirds of organizations across the globe have either fully or partially implemented zero-trust ...