“Starting around 2025-10-23 23:34 UTC, Huntress observed threat actors targeting WSUS instances publicly exposed on their…
Category: Insights
Scammers try to trick LastPass users into giving up credentials by telling them they’re dead
However, Roger Grimesdata-driven defense CISO advisor at KnowBe4, said it’s “far from” the oddest phishing lure…
The best IAM tools
Manage identities in hybrid and multi-cloud environments control privileged accounts, Analyze login patterns based on risk…
The 10 biggest issues CISOs and cyber teams face today
“What’s occupying a ton of time for CISOs today is competing priorities,” he says. “The threat…
Data sovereignty proof: How to verify controls like ‘Project Texas’
“Sovereignty isn’t just a region on a map — it’s an operating model. The hard part…
Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts
He added, Agenda Ransomware exploits Windows-centric assumptions, under-protected RMM tools, and neglected driver monitoring. Most organizations…
Europol disrupts network behind 49 million fake accounts
On October 10, Europol, in cooperation with police authorities in Estonia, Finland, Latvia and Austria, raided…
Risks of recovering from ransomware attacks
“The 60 percent recovery rate reflects several technical and operational realities that regularly arise when responding…
Do CISOs need to rethink service provider risk?
For Thiele, a request to view the enterprise risk register may be a ‘no’ but a…
70% of CISOs say internal conflicts more damaging than cyberattacks
Security experts advise CISOs to consider such perception problems when setting security strategies and communicating cybersecurity’s…