
Resources
BlastRADIUS Vulnerability Exposes RADIUS Security Flaws
July 10, 2024 | Cybersecurity researchers discovered a critical vulnerability in RADIUS, a network authentication protocol fr
FishXProxy Phishing Kit Empowers Cybercriminals
July 11, 2024 | A new phishing toolkit, FishXProxy, is lowering the barrier for creating sophisticated email attacks.
Security Leaders Discuss Life360 Data Breach
July 2, 2024 | Life360 reported a data breach affecting its subsidiary, Tile, exposing client information such as names, phon
3 New State-Backed Gangs Target Govt Sectors with HEAT Attack Methods
July 2, 2024 | Menlo Security’s latest report uncovers three new state-backed cyber gangs using Highly Evasive and Adaptive T
14 Million OpenSSH Servers Exposed via Regression Flaw
July 1, 2024 | A critical remote code execution flaw (CVE-2024-6387) in OpenSSH on glibc-based Linux systems has been discove
Phantom Secrets: The Hidden Threat in Code Repositories
July 1, 2024 | Aqua Security reveals that API tokens, credentials, and passkeys remain exposed in code repositories, even aft
Microsoft Reveals AI Security Flaw That Threatens eCommerce and Financial Services
July 1, 2024 | Microsoft has discovered "Skeleton Key," a security flaw in AI models that can bypass ethical safeguards.
Cybersecurity Burnout: Costing Enterprises More Than Money
June 28, 2024 | Cybersecurity stress is rampant, with burnout costing U.S.
Preventing Cyberattacks: The Role of Risk Profiling [Q&A]
June 28, 2024 | Randy Watkins, CTO at Critical Start, discusses the critical importance of cyber risk profiling in preventing
Polyfill Becomes a Supply-Chain Risk to 100,000 Websites
June 28, 2024 | A recent acquisition of the Polyfill domain by a Chinese company has turned it into a major supply-chain risk
Cyberattack Rate Surges as Novel Malware Growth Accelerates
June 28, 2024 | BlackBerry Limited’s latest Global Threat Intelligence Report reveals a sharp increase in cyberattacks, detec
What to Tell the Board About Malware Analysis
July 9, 2024 | Malware analysis is crucial for cybersecurity, helping security teams understand malicious software's behavior