Threat Modeling is a foundational component to Security by Design
In addition, Threat Modeling helps to describe the functional flows of an application/service within its Cloud, on-prem or distributed environments
Read moreIn addition, Threat Modeling helps to describe the functional flows of an application/service within its Cloud, on-prem or distributed environments
Read morePro CISO® announces Continuous Assessment / Continuous Remediation (CA/CR™), our registered trademark for streamlined and practical Cybersecurity Management!
Read moreThe Mind Behind The Screen - A short Pro CISO® paper that unravels Cybersecurity through the lens of psychology.
Read moreBasic cyber hygiene protects against 99% of cyber attacks. Seems easy, but that implies establishing a proper cybersecurity program, that includes people, processes and technology.
Read morePro CISO’s Threat Intelligence service identifies collections of Bitwarden password manager credentials on the Darkweb
Read moreHow the CL0P ransomware group exploits a zero day vulnerability of the MOVEit file transfer product, to attack their victims, encrypt their data and demand a ransom to decrypt the files.
Read more"Stealer" malware is the new silent threat. Targeting anyone, both individuals and organizations, with the objective to harvest credentials and sensitive information from user devices and sell them on the Darkweb
Read moreWhy did cybersecurity become a business risk? Because of ransomware ? Or maybe, because of something we've all heard about called: the Digital Transformation (DX) ?
Read moreCISA) is releasing this Cybersecurity Advisory (CSA) to warn organizations that malicious cyber actors, likely advanced persistent threat (APT) actors, are exploiting CVE-2022-22954 and CVE-2022-22960 separately and in combination
Read moreThe Five Eyes (FVEY) intelligence alliance warns managed service providers (MSPs) and their customers around increasing supply chain attacks.
Read moreThe new juvenile data extortion group, LAPSUS$, has taken big organizations by surprise with their old-fashioned social engineering attacks
Read moreA new vulnerability in the Spring Framework for Java Development Kit (JDK) version 9.0 or later. Exposes millions of systems to compromise, similarly to the Log4j vulnerability,
Read moreThe Microsoft Defender for IoT research team has discovered the method through which MikroTik devices are used in Trickbot’s C2 infrastructure.
Read moreHive Systems updates its Password Table, considering the new processing power available in 2022
Read moreTo preserve the integrity of customer data present in its devices in Ukraine, Russia, and Belarus, Cloudflare has implemented Keyless encryption and configured systems to self-isolate in case of compromise.
Read moreGoogle LLC today announced that it has signed a definitive agreement to acquire Mandiant, Inc., a leader in dynamic cyber defense and response, for $5.4 billion
Read moreLinux "Dirty Pipe" vulnerability affects Linux Kernel 5.8 and later versions, even on Android devices, allowing a non-privileged user to inject and overwrite data in read-only files.
Read moreSecurity analysts warn of a sharp rise in API attacks, with most companies still underestimating these high risks.
Read moreSecurity experts from Avanan have observed attackers taking advantage of Teams conversations to introduce malware into an organization.
Read moreThe new 2022 version of ISO/IEC 27002 has been published.
Read moreOffensive Security releases the new version of its popular open source penetration testing platform.
Read moreGustav Mahlerplein 28, 1082 MA Amsterdam, The Netherlands
VAT NL862215468B01 / KvK 81774508