
Cybersecurity
CybersecurityPossible National Security Crisis Averted: CISA’s Reversal Extends Support for CVE Database
CISA executed the option period on MITRE’s contract to keep the essential CVE cybersecurity database running.
CISA executed the option period on MITRE’s contract to keep the essential CVE cybersecurity database running.
French enterprises face growing cybersecurity risks due to complex IT environments and exposed public-facing assets. Drawing on the French EASM benchmark report, this article explores hidden vulnerabilities additionally extrapolated/highlighted by events like the Paris 2024 Olympics. It examines the financial, operational, and reputational implication of unmonitored assets and highlights how Outpost24’s External Attack Surface Management (EASM) solutions can empower French organizations to detect and secure critical assets in their infrastructure and safeguard these against ever evolving threats.
APIs are crucial in modern digital ecosystems but face growing threats, making robust security essential to prevent data breaches and operational disruptions. A multi-layered defense strategy that incorporates scalable infrastructure, AI/ML-driven defenses, and real-time threat detection is vital for comprehensive protection and business continuity.
Apple’s Passwords app had a security flaw that exposed users to phishing attacks for months. Learn what happened and how to stay protected.
A year after VMware ESXi servers faced ransomware attacks, new zero-day vulnerabilities are being exploited, posing risks to organizations worldwide.
From addressing burnout to managing machine identities enterprise-wide, here are key topics that CISOs and cybersecurity teams should be focused on this year.
North Korea’s Lazarus Group pulled off the $1.5B Bybit hack, making it the biggest crypto heist ever. Here’s how they did it—and what’s next.
PirateFi, a Steam game, was found spreading Vidar malware, stealing user data. Steam removed it, but gamers must take urgent security steps.
This $44.99 bundle gives you 92 hours of training in penetration testing, network security, and much more.
About 23% of security teams include women, ISC2 found in its Cybersecurity Workforce Study.
Explore the differences between IAM and PAM solutions, and learn their respective roles and importance in protecting sensitive data and systems.
Cyber security threat actor VexTrio is flying under the radar for most APAC region cyber security professionals because it is a web traffic distribution middle man rather than an endpoint source of malware.
Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual environment, you need to deploy cloud security.
Phishing is so last year: Akamai's report finds that zero-day and one-day vulnerabilities caused a 143% increase in total ransomware victims.
In this Executive Brief by Preetham Gurram, Vice President of Product, Addigy, learn how to proactively manage Apple devices.