Sudo Vulnerability Discovered, May Exposes Linux Systems Jordyn Alger July 11, 2025 Sudo, the privileged command-line tool often installed on Linux systems, has two local privilege vulnerabilities. Read More
Increase in Identity-Based Attacks Attributed to Infostealers Security Staff July 11, 2025 Info-stealing malware and advanced phishing kits account for 156% increase in cyberattacks that target user logins. Read More
Security Through Quality: Navigating the Latest Cybersecurity Executive Order Nathan Jones July 10, 2025 The recent Executive Order from the Trump Administration, while modifying some prior requirements, underscores a crucial truth: agencies still bear the unchanged responsibility of safeguarding mission and data. Read More
Security Leaders Discuss Marco Rubio AI Imposter Jordyn Alger July 10, 2025 Secretary of State Marco Rubio was recently impersonated via text messages and AI voice messages. Read More
How to Prevent “Smash & Grab” Cyberattacks T.J. Ramsey July 10, 2025 The best way to prevent smash & grab cyberattacks is to safeguard shared drives and implement MFA protection in a timely manner.Read More
Special Report: Women in Security 2025 Mary Carmichael: Building City-Wide Cybersecurity Taelor Sutherland July 10, 2025 Mary Carmichael has worked hard to expand cybersecurity awareness within her organization and larger community.Read More
Threat Actor Targeting Indian Defense Sector Jordyn Alger July 9, 2025 A threat actor based in Pakistan (APT36) has engaged in a sophisticated cyber-espionage campaign.Read More
OT Security Responsibility Is Elevating to Executive Leadership Jordyn Alger July 9, 2025 New research delves into the state of operational technology (OT) cybersecurity. Read More
Phishing Scams Can Deceive Large Language Models Jordyn Alger July 8, 2025 LLMs have been observed leading users to phishing links. Read More
The Internal Blast Radius of Ransomware Attacks: Why Cyber Resilience Must Start with People Dr. Darren Williams July 8, 2025 In the aftermath of an attack, the human impact inside the company can often be overlooked. Read More