In cybersecurity, ‘red teaming’ has emerged as a critical concept. But what exactly is it? It’s an exercise designed to challenge an organisation, testing its resilience and readiness against potential threats. Red
Article Summary TLDR: Change Healthcare made a ransom payment to protect patient data after a devastating cyber attack. The hacker group AlphV/BlackCat accessed patient information, but no detailed medical histories were stolen.
TLDR: The New PSTI Act seeks to make connected digital devices more secure by implementing minimum security requirements for manufacturers The Act will come into effect in the UK on Monday 29
TLDR: Cyberattack hits Georgia county at the center of voting software breach. Coffee County’s access to statewide election systems severed due to unusual cyber activity. In a recent cyberattack, the computer infrastructure
Article Summary TLDR: A critical Chrome update has been issued for all Windows users. The update includes fixes to the underlying graphics engine and memory vulnerabilities. If you are a Windows user
Article Summary TLDR: Many organizations are still vulnerable to Cactus ransomware due to unpatched Qlik Sense servers Qlik had disclosed vulnerabilities in August and September 2023, but Cactus actors have been exploiting
TLDR: Key Points: Kaiser Permanente reported a security breach affecting 13.4 million individuals, involving data sharing with third-party companies. PlugX malware is found in over 170 countries, with researchers speculating on its
Article Summary TLDR: Systemic exclusion is a troubling reality for many in the cybersecurity industry. Women are five times more likely to report exclusion from direct managers and peers. Most of us
TLDR: Key points: Top 10 countries hosting cybercriminal threats identified eScan antivirus product vulnerability exploited by threat actor Summary: In the Week in Review for the week ending Friday, April 26, 2024,
Article Summary TLDR: Cloud security practices are not fully mature, with significant breaches and losses. A nation-state threat actor used MITRE techniques to breach MITRE itself. Lessons for CISOs from OWASP’s LLM