
Resources
Threat Actors Exploit Zero Days Within 5 Days, Says Google’s Mandiant
Oct 17, 2024 | Google Mandiant’s analysis of 138 actively exploited vulnerabilities in 2023 reveals a concer
Basic Cyber Hygiene Still Offers the Best Defense Against Ransomware
Oct 17, 2024 | The FBI’s takedown of the Dispossessor ransomware gang highlights a critical truth: simple cy
Open-Source Entry Points Targeted for Supply Chain Compromise
Oct 15, 2024 | Threat actors are exploiting open-source environments like PyPI, npm, and Ruby Gems through c
Command-Jacking Used to Launch Malicious Code on Open-Source Platforms
Oct 14, 2024 | Attackers are exploiting entry points in open-source environments like PyPI and npm through c
Fidelity Investments Data Breach Impacts More Than 77,000 Customers
Oct 14, 2024 | Fidelity Investments disclosed a data breach affecting over 77,000 customers.
Black Lotus, Emotet, Beep, and Dark Pink: Top Malware Threats of 2024
Oct 15, 2024 | As 2024 closes, malware like Black Lotus, Emotet, Beep, and Dark Pink continue to evolve, exp

CISA Adds Mitel, Oracle, flaws to the KEV list
January 10, 2025 | CISA has updated its Known Exploited Vulnerabilities (KEV) catalog with critical flaws in
Iranian "Dream Job" Campaign Targets Aerospace Sector
Nov 15, 2024 | Iranian threat group TA455 is using fake job offers to infiltrate the aerospace industry, acc
Zero-Day Exploits Surge in 2023: Cisco and Fortinet Under Fire
Nov 15, 2024 | In 2023, attackers increasingly targeted zero-day vulnerabilities, leveraging flaws in Citrix

Sharing of Telegram User Data Surges After CEO Arrest – Critical Start
Jan. 7, 2025 | Telegram, once known for strict user privacy, shared data from 14 to 900 U.S.
Celebrating the 2024 Women in IT Security Honorees – SC Media
Nov 14, 2024 | Meet the extraordinary women driving innovation in cybersecurity.