Skip to main content

Posts

Showing posts from January, 2023

OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings

New Cyber Insights 2023 Series | GitHub Revokes Code Signing Certificates Following Cyberattack SecurityWeek News Briefing | Tuesday, January 31, 2023 OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings GitHub Revokes Code Signing Certificates Following Cyberattack Sentra Raises $30 Million for DSPM Technology Microsoft’s Verified Publisher Status Abused in Email Theft Campaign Guardz Emerges From Stealth Mode With $10 Million in Funding How the Atomized Network Changed Enterprise Protection Critical QNAP Vulnerability Leads to Code Injection Saviynt Raises $205M; Founder Rejoins as CEO Cyber Insights 2023 Series: Cyberinsurance Attack Surface Management Artificial Intelligence Russian Millionaire on Trial in Hack, Insider Trade Scheme 265 Brands Impersonated in Phishing Attacks See the latest threat research from Abnormal Intelligence, with i...

Webcast: Building Sustainable OT Cybersecurity Programs

Setting OT security program goals and responsibilities - Live Webcast You received this security resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Building Sustainable OT Cybersecurity Programs Live Webcast : Thursday, February 23, 2023 - Register Greetings! You're invited to join our live webinar on February 23rd as we discuss practical steps for designing, implementing, and maintaining sustainable operational technology (OT) cyber security programs...

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

Russia-Linked Hackers Use New Malware Attacks SecurityWeek News Briefing | Monday, January 30, 2023 The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment Russia-Linked Hackers Use New Malware Attacks Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers Industry Reactions to Hive Ransomware Takedown: Feedback Friday Discover the Difference AI-Driven Automation Makes Alert and data overload holding your security team back? With AI by your side, your SOC will operate more efficiently and cost-effectively. Get the Guide Mapping Threat Intelligence to the NIST Compliance Framework Part 2 How threat intelligence is critical when justifying bud...