Top 5 Ransomware Attacks and Data Breaches of 2024
As we approach the end of 2024, it's clear that the landscape of cyber threats has continued to evolve at an alarming pace. With...
Germany Investigates BadBox Malware Infections, Targeting Over 192,000 Devices
Germany has launched an investigation into reports of a significant cyber threat believed to be linked to the BadBox Malware, which has allegedly infected...
RIIG Announces Two New Board Members to Guide Strategy and Accelerate Growth
New Board Members Include Top Leaders in Tech, Scientific Communities
Charlottesville, VA (12/18/2024) — RIIG, an AI driven risk intelligence and cybersecurity solutions provider, announces...
The UK’s Cybersecurity Landscape: Key Trends and Challenges for 2025
Almost every single organisation, large or small, is acutely aware of the need to implement robust security measures. However, this is easier said than...
PCI DSS 4.0: A Comprehensive Guide to Enhanced Payment Data Security
In the ever-evolving landscape of cybersecurity, regulation often plays a lagging, but critical role in driving industry wide improvements in security posture, particularly around...
How Fraudsters Are Adopting Cybersecurity Techniques to Bypass Detection
Each year, companies lose around 5% of their annual revenue to fraud, which is a conservative estimate as most fraud goes undetected. As a...
Maryland Association of Community Colleges and BCR Cyber Receive TEDCO Grant
Equitech Growth Fund Award for Developing Infrastructure to Enable Workforce Development Efforts
Baltimore, MD (12/19/24) - The Maryland Association of Community Colleges (MACC), the advocate...
Combatting phantom secrets: have you heard of historical secrets scanning?
Most people are familiar with the concept of Schrödinger’s Cat – a thought experiment, whereby a hypothetical cat is sealed in a box with...
New Report Shows That The U.S. Leads in Anonymous Open-Source Contributions
A recent report by Lineaje AI Labs has revealed that the United States is the top contributor to open-source projects, but it also leads...
HackerOne Cybersecurity Platform Joins AWS Marketplace
HackerOne’s suite of cybersecurity tools, including bug bounty programs and vulnerability disclosure services, is now available through the AWS Marketplace, expanding options for organizations...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...