Zero-Trust For All: A Practical Guide Cyber Review April 22, 2022 How to use zero-trust architecture effectively in today’s modern cloud-dependent infrastructures. While “zero-trust architecture” has become…
Rethinking Cyber-Defense Strategies in the Public-Cloud Age Cyber Review April 19, 2022 Exploring what’s next for public-cloud security, including top risks and how to implement better risk management.…
Protect Your Executives’ Cybersecurity Amidst Global Cyberwar Cyber Review April 19, 2022 In this time of unprecedented cyberwar, organizations must protect the personal digital lives of their executives…
Cyberattackers Put the Pedal to the Medal: Podcast Cyber Review April 18, 2022 Fortinet’s Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where…
Microsoft Zero-Days, Wormable Bugs Spark Concern Cyber Review April 12, 2022 For April Patch Tuesday, the computing giant addressed a zero-day under active attack and several critical…
Belarusian ‘Ghostwriter’ Actor Picks Up BitB for Ukraine-Related Attacks Cyber Review March 31, 2022 Ghostwriter is one of 3 campaigns using war-themed attacks, with cyber-fire coming in from government-backed actors…
Lapsus$ ‘Back from Vacation’ Cyber Review March 30, 2022 Lapsus$ added IT giant Globant plus 70GB of leaked data – including admin credentials for scads…
Microsoft Azure Developers Awash in PII-Stealing npm Packages Cyber Review March 24, 2022 A large-scale, automated typosquatting attack saw 200+ malicious packages flood the npm code repository, targeting popular…
Top 3 Attack Trends in API Security – Podcast Cyber Review March 24, 2022 Bots & automated attacks have exploded, with attackers and developers alike in love with APIs, according…
Misconfigured Firebase Databases Exposing Data in Mobile Apps Cyber Review March 17, 2022 Five percent of the databases are vulnerable to threat actors: It’s a gold mine of exploit…