Loading...
The day's top cybersecurity news and in-depth coverage
July 09, 2022
The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings. Read more â¶
At PwC, we met the cyber talent crisis head-on by developing a training program that curated training content from the worldâs leading vendors. Learn how ProEdge, a PwC product, provides cyber-specific experiential learning opportunities that can help you prepare for tomorrowâs threats today.
APT group's use of a legitimate pen-testing tool gives them stealth capabilities, allowing them to avoid detection by EDR and antivirus tools.
The ZuoRAT remote access Trojan malware can compromise multiple router brands and likely has been active for years.
Is your cybersecurity approach stuck in a reactive stance? Lack of information security influence and a siloed approach to decision-making are common obstacles. Register for CSOâs Future of #Cybersecurity Summit to reduce your vulnerability with unilateral risk management tips from Lenovo, Atlassian, MITRE Labs & Under Armour. Sign up today using the link below:
One public-key encryption and three digital signature algorithms determined to provide the best defense against quantum attacks.
New guidance shows how to harden PowerShell and make it more difficult for threat actors to hijack for malicious purposes.
Criminal use of the LockBit ransomware as a service is growing rapidly thanks to updates to the malware and the decline of other ransomware gangs.
Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.
© 2024