Navigating the NIS 2 Landscape – Part 1
NIS 2, the EU's new cybersecurity directive, expands its reach, tightens regulations, and emphasizes supply chain security.
NIS 2, the EU's new cybersecurity directive, expands its reach, tightens regulations, and emphasizes supply chain security.
Attacks on public sector bodies are on the rise. Find out how to improve their cybersecurity below.
One of the entry vectors for malware comes through advertisements displayed on certain websites. A document sent to the US Congress confirms that both the NSA and the CIA deploy ad blockers in browsers as an additional protection measure against malware.
The attack exploited zero day vulnerabilities in Microsoft Exchange but above all it highlighted the risk organizations face from sophisticated APTS from groups linked to foreign powers. How can organizations protect themselves against this type of threat?
The cyber-attackers gained access to Kubernetes using password spraying techniques. Discover how a secure MFA prevents these techniques and advanced firewalls reduce the chances of network intrusions.
WatchGuard’s Corey Nachreiner explores the history of ICS attacks.
North Korean cybercriminals managed to break in by getting hold of an email and the credentials of a former advisor to President Moon-Jae In
Fujitsu´ SaaS tool, ProjectWEB, suffered a cyberattack during which confidential data had been leaked.
These cyber-criminal groups use highly advanced techniques and procedures and therefore pose a significant threat to service providers and their customers. MSPs can reduce the risks if they apply good practices and have the right tools in place.