Modern Listing Example
ESET Research discovers CDRThief, malware attacking Chinese VoIP platform
ESET researchers have discovered and analyzed malware that targets Voice over IP (VoIP) softswitches. This…
Newcastle University (UK) held ransom by hackers threatening to expose students’ data
Newcastle University in the UK has reported a serious cyber incident, reported to be a…
Voxility Mitigates Multiple 1Tbps+ DDoS Attacks in the First Week of September
A massive wave of network layer DDoS attacks reached the Voxility network last week in…
Global report preview. Acronis research & survey reveals new numbers
Acronis has released Acronis Cyber Protect 15, which integrates backup, disaster recovery, next-generation anti-malware, cybersecurity,…
Feedback Wanted on New NIST IoT Paper – Network-Layer Onboarding & Taxonomy
The NCCoE is seeking your feedback on a paper titled Trusted Internet of Things (IoT)…
Claroty researchers discover critical vulnerabilities in ICS license management solution
License management solutions are third-party components used by ICS vendors to protect against fraud, illegal…
CyGov launches the Centraleyes™ brand— platform for automating inputs, integrating data & visualizing risks
Cloud-based cyber risk platform provider CyGov has announced a thorough re-brand of its platform. The…
Neurodiversity in Cybersecurity skillsets
By Dr. Astha Keshariya Cybersecurity is rather loosely used term with varying subjective definitions due…