Resources

News

GitLab Fixes Critical Pipeline Vulnerability

September 17, 2024 | GitLab has released security updates for 17 vulnerabilities, including a critical flaw

News

Cyber Threats That Shaped H1 2024

Sept 02, 2024 | In the first half of 2024, cybercrime surged across industries, with ransomware and database leaks hitting Ma

News

Closing the Gap Between Cyber Risk Strategy and Execution

September 18, 2024 | A recent Cyber Risk Peer Benchmarking Report from Critical Start reveals a disconnect between strategy a

News

How GM CEO Mary Barra is Tackling Her Second Major Transformation

September 4, 2024 | Mary Barra, CEO of General Motors, is steering the company through a second major transf

News

North Korean’s Stonefly Shifts from Espionage to Ransomware, Extortion

October 2, 2024 | North Korean hacking group Stonefly has shifted from espionage to financially motivated at

News

Four Ways to Stay Ahead of the Ransomware Threat

September 18, 2024 | Ransomware groups like LockBit, Play, and BlackBasta are behind 40.54% of attacks in 2024.

News

Gartner Magic Quadrant Names Microsoft, SentinelOne Among EPP Leaders

October 3, 2024 | Microsoft, SentinelOne, and CrowdStrike lead Gartner’s 2024 Magic Quadrant for endpoint pr

News

TeamTNT Hackers Attacking VPS Servers Running CentOS

September 20, 2024 | The hacking group TeamTNT has launched a new attack campaign targeting VPS ser

News

Salt Typhoon Targets U.S. ISPs: A New Cyber Threat

September 27, 2024 | The China-linked group Salt Typhoon has targeted several U.S.

News

GitLab Patches Bug That Could Expose CI/CD Pipeline to Supply Chain Attack

September 13, 2024 | GitLab has patched a critical vulnerability (CVE-2024-6678) with a CVSS score of 9.9, w

News

Manufacturing Day 2024

October 3, 2024 | Manufacturing Day kicks off today, launching a month-long series of events across the U.S.

News

Zero-Click Vulnerabilities in macOS Calendar Risk iCloud Data Exposure

A series of macOS vulnerabilities in the Calendar app exposed iCloud data by bypassing security features like Gatekeeper and