GRC for Security Managers: From Checklists to Influence
This webcast was originally aired on January 16, 2025. In this video, Kelli K. Tarala and CJ Cox discuss the […]
GRC for Security Managers: From Checklists to Influence Read More »
This webcast was originally aired on January 16, 2025. In this video, Kelli K. Tarala and CJ Cox discuss the […]
GRC for Security Managers: From Checklists to Influence Read More »
UnitedHealth says it now estimates that the data breach on its subsidiary Change Healthcare affected 190 million people, nearly doubling
UnitedHealth almost doubles victim numbers from massive Change Healthcare data breach Read More »
Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could
GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs Read More »
Cloudflare’s network provides an enormous array of services to our customers. We collect and deliver associated data to customers in
Over 700 million events/second: How we make sense of too much data Read More »
As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers. KPMG found that
How secure are green data centers? Consider these 5 trends Read More »
Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals could also
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January] Read More »
The Open Web Application Security Project has recently introduced a new Top 10 project – the Non-Human Identity (NHI) Top
Do We Really Need The OWASP NHI Top 10? Read More »
Last week on Malwarebytes Labs: Your location or browsing habits could lead to price increases when buying online AI tool
A week in security (January 20 – January 26) Read More »
A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlin-aligned Gamaredon hacking group in its
GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities Read More »