CyberSec News
- Cybersecurity needs more than strong tech, it needs strong messaging - February 20, 2025
- Phishing remains the preferred technique among threat actors - February 19, 2025
- US agencies and defense contractors infected with infostealing malware - February 19, 2025
- 76% of security leaders plan to increase their security budgets in 2025 - February 19, 2025
- Retail resilience: Technology strategies to combat organized theft - February 19, 2025
- Ransomware attack hits 5 Michigan casinos, shuts them down - February 18, 2025
- Super Bowl Sunday saw a 57% rise in malicious gambling content - February 18, 2025
- The Change Healthcare breach: What changed, what didn’t, and what must - February 18, 2025
- Cyber incident response in 2025: Rising risks and dynamic challenges - February 18, 2025
- Understanding the value and practicality of cyber insurance - February 17, 2025
- The top 4 unmanaged apps are AI-driven - February 17, 2025
- 6 tips to ace security posture in higher education - February 17, 2025
- Chief Executive Officers, accountability and hidden violations - February 17, 2025
- Gmail, Yahoo targeted by a new two-factor authentication phishing kit - February 14, 2025
- Strategies for building an effective threat management team - February 14, 2025
Feeds
Windows Internals Blog
- Secure Kernel Research with LiveCloudKd - May 2, 2024
- Troubleshooting a System Crash - January 30, 2024
- KASLR Leaks Restriction - November 26, 2023
- Investigating Filter Communication Ports - January 4, 2023
- An End to KASLR Bypasses? - November 23, 2022
CISA
- #StopRansomware: Ghost (Cring) Ransomware - February 19, 2025
- Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications - January 15, 2025
- Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization - August 2, 2024
- 2023 Top Routinely Exploited Vulnerabilities - November 8, 2024
- Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations - September 30, 2024
US CERT
- CISA and Partners Release Advisory on Ghost (Cring) Ransomware - February 19, 2025
- CISA Adds Two Known Exploited Vulnerabilities to Catalog - February 18, 2025
- CISA Releases Two Industrial Control Systems Advisories - February 18, 2025
- CISA Adds One Known Exploited Vulnerability to Catalog - February 13, 2025
- CISA Releases Twenty Industrial Control Systems Advisories - February 13, 2025
NIST
- Open Industrial Digital Ecosystem Summit - April 8, 2025
- 5th High-Performance Computing Security Workshop - May 7, 2025
- Workshop on Foundational Cybersecurity Activities for IoT Device Manufacturers - March 5, 2025
- Border Gateway Protocol Security and Resilience | NIST Releases Public Draft of SP 800-189 Revision 1 - January 3, 2025
- macOS Security Compliance Project Developer Conference - March 25, 2025