
Resources
CISOs Concerned Over Growing Demands of Their Role – DICE Insights
Nov 18, 2024 | With cybersecurity threats growing in complexity, 84% of CISOs advocate splitting their role
Always-on Defense: The Critical Role of Monitoring in Manufacturing Cyber Protection
Nov 11, 2024 | Cyberattacks on manufacturing are rising, targeting legacy systems and interconnected network
Malicious PyPI Package Steals AWS Credentials: A Long-Term Supply Chain Threat
Nov 11, 2024 | Cybersecurity researchers have uncovered a malicious PyPI package, "fabrice," exfiltrating AW
Latrodectus Malware: The Stealth Phishing Threat to Critical Sectors – SC Media
Nov 11, 2024 | Emerging in 2023, Latrodectus malware targets critical sectors like finance, healthcare, and
Tricked By a CAPTCHA: Cybercriminals Exploit Fake Verifications to Steal Sensitive Data – SC Media
Nov 12, 2024 | Lumma Stealer malware leverages fake CAPTCHA pages to execute advanced attacks, deceiving use
Critical Start’s Callie Guenther: Shaping the Future of Digital Defense – SC Media
Nov 13, 2024 | From her Navy beginnings to leading Critical Start’s Cyber Research Unit, Callie Guenther’s i
Iranian Group Targets Aerospace Workers with Fake Job Lures – SC Media
Nov 13, 2024 | The Iranian Dream Job Campaign, active since September 2023, sees TA455 (UNC1549) targeting a
Celebrating the 2024 Women in IT Security Honorees – SC Media
Nov 14, 2024 | Meet the extraordinary women driving innovation in cybersecurity.
Zero-Day Exploits Surge in 2023: Cisco and Fortinet Under Fire
Nov 15, 2024 | In 2023, attackers increasingly targeted zero-day vulnerabilities, leveraging flaws in Citrix
Iranian "Dream Job" Campaign Targets Aerospace Sector
Nov 15, 2024 | Iranian threat group TA455 is using fake job offers to infiltrate the aerospace industry, acc
Black Lotus, Emotet, Beep, and Dark Pink: Top Malware Threats of 2024
Oct 15, 2024 | As 2024 closes, malware like Black Lotus, Emotet, Beep, and Dark Pink continue to evolve, exp
[On-Demand Webinar] Leveraging MDR to Streamline Phishing Detection and Response
The evolving threat of phishing requires organizations to adopt smarter, faster, and more effective security measures.