In episode 25 of the Cybersecurity & Geopolitical Discussion, our trio of hosts pull apart the rapidly deteriorating situation in the Middle East.
Iranian cyber actors are targeting critical infrastructure entities via brute force.
Researchers at the University of Texas at Austin discovered a new attack method.
Cybersecurity Tech Accord Principle #3: Capacity Building The third Cybersecurity Tech Accord principle says that “we will help empower users, customers and developers to strengthen cybersecurity protection” which means ensuring Read more…
Due to evidence of active exploitation, CISA added three vulnerabilities to its Known Exploited Vulnerabilities Catalogue.
Every chief information security officer knows it isn’t a matter of “if” but “when” the systems that run their business will be disrupted in some way.
The Federal Trade Commission has denied a motion filed by H&R Block Inc. to disqualify the Administrative Law Judge overseeing the hearing concerning a complaint filed by the Commission against Read more…
93% of hackers believe AI tools used by companies have opened up a new attack vector for malicious actors to exploit.
The effect of cybersecurity incidents on healthcare organizations was analyzed in a recent Proofpoint report.
New research shows the current threats associated with the 2024 Presidential Election.