- Hurrah for Denmark, Top Winner of the 2022 European Cybersecurity Challenge. (to the original material)
- CISA Releases Eight industrial Control Systems Advisories. (to the original material)
- Vulnerability Summary for the Week of September 12, 2022. (to the original material)
- GTA 6 in-development footage leaked. (to the original material)
- High severity vulnerabilities found in Harbor open-source artifact registry. (to the original material)
- Crypto giveaway scams continue to escalate. (to the original material)
- What do SOC analysts need to be successful? (to the original material)
- Most critical security gaps in the public cloud. (to the original material)
- American Airlines discloses data breach after employee email compromise. (to the original material)
- Microsoft 365 phishing attacks impersonate U.S. govt agencies. (to the original material)
- Russian Sandworm hackers pose as Ukrainian telcos to drop malware. (to the original material)
- Uber links breach to Lapsus$ group, blames contractor for hack. (to the original material)
- VMware, Microsoft warn of widespread Chromeloader malware attacks. (to the original material)
- Revolut hack exposes data of 50,000 users, fuels new phishing wave. (to the original material)
- How botnet attacks work and how to defend against them. (to the original material)
- Prevention-first MDR (Managed Detection and Response)/ MPR – Elevating Managed Detection and Response to the Next Level. (to the original material)
- FBI Warns Healthcare Sector of Surge in Payment Scams. (to the original material)
- Harassment Site Kiwi Farms Breached. (to the original material)
- API Security in Federal Government. (to the original material)
- What is SASE? (to the original material)
- Extended detection and response (XDR): Metrics to consider. (to the original material)
- A cloud isn’t smart unless it’s secure. (to the original material)
- Third-party cookies: how they work and how to prevent them from tracking your web activity. (to the original material)
- Report calls out ad network malware complicity. (to the original material)