
Resources
5 ways to prepare a new cybersecurity team for a crisis
July 10, 2023
The Vulnerability Crisis: Safeguarding PII in Web Apps
August 29, 2023
AWS Warns of ‘ShellTorch’ Issue Affecting Code Related to AI Models
October 3, 2023 | Amazon Web Services (AWS) has issued a warning regarding a vulnerability affecting TorchServe, a tool used
Why Instagram Threads is a Hotbed of Risks for Businesses
September 4, 2023
Hacker Advocates Turning Tracking Tables on Law Enforcement
October 10, 2023 | A robotics hacker, Alan Meekins (Nullagent), created RFParty, a service enabling people to monitor police
A Cybersecurity Wish List Ahead of NATO Summit
July 10, 2023
Attackers Leverage Windows Advanced Installer to Drop Cryptocurrency Malware
September 7, 2023 | Advanced Installer, a legitimate windows tool, is being hijacked by threat actors, in order to create sof
Exploitation Accounts For 29% of Education Sector Attacks
October 11, 2023 | The education sector is increasingly targeted by cyber threats, with 29% of attacks on K-12 schools origin