HubSpot Account Hacks: Confirmed Breaches & Ongoing Investigation
HubSpot confirms customer account breaches and is working to secure affected accounts
JavaScript Supply Chain Attack Hits 100,000+ Sites
A supply chain attack on Polyfill.io compromised over 100,000 websites by redirecting users to malicious sites.
Economics of Cybersecurity: Insights from the Colonial Pipeline Incident
The Financial Logic of Cybersecurity: The Colonial Pipeline Case as a Model for Preventing Losses Exceeding Security Investments.
Who are CyberAv3ngers?
The primary objective of Cyber Av3ngers appears to be geopolitical disruption, targeting Israeli and US infrastructure.
Top Cybersecurity Hacks for Black Friday Shopping
It's the most wonderful time of the year! So enjoy it with these Black Friday shopping security tips.
Code of War: The Stuxnet Story
The dark corners of cyberwarfare, 'Code of War: The Stuxnet Story.' This blog post illuminates the strategic partnership between U.S. and Israeli intelligence that led to the development of Stuxnet — a sophisticated cyberweapon targeting Iran's nuclear program.
The Conficker Worm: A Sleeping Giant
The enigmatic world of the Conficker worm, a cybersecurity threat that emerged in 2008 and remains a 'sleeping giant.' Explore its history, the global efforts to combat it, and why it's still a concern today.
The Morris Worm & the Birth of Cybersecurity
The captivating story of the Morris Worm, the first Internet worm that led to the birth of modern cybersecurity. Robert Tappan Morris's curiosity had far-reaching consequences on the digital world.
Top 10 Cybersecurity Experts You Should Be Following in 2023
Staying updated on the latest in cybersecurity is crucial. Here’s the top 10 people you should be following in the industry.
SEC's Cybersecurity Shake-Up for Market Security
The SEC has proposes new cybersecurity requirements for financial market entities.