Resources

Image
Press Release

Built In Honors Critical Start in Its Esteemed 2025 Best Places To Work Awards

 Critical Start Earns Spot 100 Best Midsize Places to Work in Dallas

News

Fidelity Investments Data Breach Impacts More Than 77,000 Customers

Oct 14, 2024 | Fidelity Investments disclosed a data breach affecting over 77,000 customers.

News

Command-Jacking Used to Launch Malicious Code on Open-Source Platforms

Oct 14, 2024 | Attackers are exploiting entry points in open-source environments like PyPI and npm through c

News

Open-Source Entry Points Targeted for Supply Chain Compromise

Oct 15, 2024 | Threat actors are exploiting open-source environments like PyPI, npm, and Ruby Gems through c

News

Basic Cyber Hygiene Still Offers the Best Defense Against Ransomware

Oct 17, 2024 | The FBI’s takedown of the Dispossessor ransomware gang highlights a critical truth: simple cy

News

Threat Actors Exploit Zero Days Within 5 Days, Says Google’s Mandiant

Oct 17, 2024 | Google Mandiant’s analysis of 138 actively exploited vulnerabilities in 2023 reveals a concer

News

CISOs Concerned Over Growing Demands of Their Role – DICE Insights

Nov 18, 2024 | With cybersecurity threats growing in complexity, 84% of CISOs advocate splitting their role

News

Always-on Defense: The Critical Role of Monitoring in Manufacturing Cyber Protection

Nov 11, 2024 | Cyberattacks on manufacturing are rising, targeting legacy systems and interconnected network

News

Malicious PyPI Package Steals AWS Credentials: A Long-Term Supply Chain Threat

Nov 11, 2024 | Cybersecurity researchers have uncovered a malicious PyPI package, "fabrice," exfiltrating AW

News

Latrodectus Malware: The Stealth Phishing Threat to Critical Sectors – SC Media

Nov 11, 2024 | Emerging in 2023, Latrodectus malware targets critical sectors like finance, healthcare, and

News

Tricked By a CAPTCHA: Cybercriminals Exploit Fake Verifications to Steal Sensitive Data – SC Media

Nov 12, 2024 | Lumma Stealer malware leverages fake CAPTCHA pages to execute advanced attacks, deceiving use