Federal agencies warn of rising Interlock ransomware attacks targeting healthcare and critical sectors using double extortion and advanced social engineering.
Federal agencies warn of rising Interlock ransomware attacks targeting healthcare and critical sectors using double extortion and advanced social engineering.
A series of cyberattacks targeting Microsoft collaboration software, specifically SharePoint, have been linked to Chinese hackers and threat actors.
SE Labs research identifies the many ways Email Threat Defense successfully defends against advanced email threats in real time to earn the highest rating.
The new Cisco XDR Connect tool helps users to search, browse, and view the details of all available XDR integrations and automation content.
In May 2025, 160k records of customer data was allegedly obtained from Creams Cafe, “the UK’s favourite dessert parlour”. The data included email and physical addresses, names and phone numbers. Creams Cafe did not respond to repeated attempts to disclose the incident, however multiple impacted HIBP subscribers confirmed the legitimacy and accuracy of the data.
Cyber extortion group World Leaks released more than 1.3TB of internal Dell data, including scripts and backups. Dell insists no sensitive customer information was exposed.
The CISMP (Certificate in Information Security Management Principles) is one of the UK’s most widely recognised entry-level qualifications for information security professionals. Accredited by BCS, The Chartered Institute for IT, it provides a comprehensive foundation in cyber security and information security management. CISMP is designed for individuals working in, or aspiring to work in, security-related roles – particularly those seeking to progress into management or governance positions. It is also suitable for business professionals who need a broader understanding of information security as part of their wider operational responsibilities. It is frequently cited as the first step towards more advanced
The post The 9 CISMP Domains Explained appeared first on IT Governance Blog.
The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program.
Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity.
Thanks to Brad Duncan for sharing this pcap from 2025-07-08 on his malware traffic analysis site! Due to issues with […]