
Resources
AHA, H-ISAC Warn Hospitals About Black Basta Following Ascension Cyberattack – Healthcare IT News
May 13, 2024 | Following a major cyberattack on Ascension health system, the AHA and H-ISAC issued alerts ab
Google Rushes to Patch Second Actively Exploited Chrome Zero-Day in a Week – Secure World Magazine
May 15, 2024 | Google released an emergency update for Chrome (CVE-2024-4761), an out-of-bounds write flaw i
Dangerous Google Chrome Zero-Day Allows Sandbox Escape – Dark Reading
May 14, 2024 | Google released an emergency update for Chrome, addressing a zero-day vulnerability (CVE-2024
Popular WordPress Plugins Leave Millions Open to Backdoor Attacks - Hack Read
June 3, 2024 | Fastly researchers discovered vulnerabilities in popular WordPress plugins, including WP Meta SEO, WP Statisti
Hotel Check-in Kiosks Expose Guest Data, Room Keys - Dark Reading
June 7, 2024 | A vulnerability in Ariane Systems' kiosk platform (CVE-2024-37364) allows attackers to access guest data and c
39% of MSPs Adapting to New Technologies Is Their Biggest Challenge - Security Magazine
June 3, 2024 | A recent report reveals that 39% of Managed Service Providers (MSPs) find adapting to emerging cybersecurity s
IT and Cybersecurity Jobs Are Converging: What It Means for Tech Pros – DICE Insights
June 13, 2024 | As technology evolves, IT and cybersecurity roles are merging, requiring tech professionals to acquire skills
Dell Data Breach Impacts 49 Million Customers - CPO Magazine
May 15, 2024 | Dell Technologies reported a data breach affecting 49 million customers, exposing personal information through
CISA Unveils Critical Infrastructure Reporting Rule – Security Boulevard
April 5, 2024 | CISA announced a new rule under the Cyber Incident Reporting for Critical Infrastructure Act
Location Tracker Firm Tile Hit by Data Breach, Hackers Access Internal Tools – Hack Read
June 14, 2024 | Millions of Tile users' personal information may have been exposed in a data breach where hackers accessed in
Strategic Cyber Defense: Balancing Threat-Centric and Risk-Centric Approaches – CPO Magazine
May 15, 2024 | In cybersecurity, distinguishing between vulnerabilities, threats, and risks is crucial.
Nvidia Patches High-Severity Flaws in GPU Drivers – Dark Reading
June 12, 2024 | Nvidia has issued patches for high-severity vulnerabilities in its GPU drivers and virtualization software, c