|
You are here |
www.dragos.com | ||
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
thehackernews.com
|
|
| | | | | Czechia and Germany reveal they were targets of a massive cyber espionage campaign by Russia-linked APT28 hacker group. | |
| | | | |
blog.eclecticiq.com
|
|
| | | | | This issue of the Analyst Prompt looks at IRIDUIM's ransomware campaign causing disruption in Ukraine and Poland, the continued use of log4shell by threats actors across the threat landscape, and Australia's new joint standing operation to disrupt and stop cybercriminal syndicates. | |
| | | | |
www.nozominetworks.com
|
|
| | | As the lines between traditional IT risk management and operational risk management continue to blur, it's critical for CISOs to incorporate OT cybersecurity into their enterprise security strategy. | ||