Chinese threat actor resided in US electric grid for almost one year Jordyn Alger March 17, 2025 A case study discusses an intrusion into the United States electric grid associated with Volt Typhoon, a Chinese threat actor. Read More
3 Ivanti flaws added to CISA’s vulnerabilities catalogue Jordyn Alger March 14, 2025 CISA has announced five known exploited vulnerabilities now in its catalogue, three of which are Ivanti Endpoint Manager flaws. Read More
Cyber leaders must prepare quantum security now, research finds Jordyn Alger March 14, 2025 Cybersecurity leaders share their insights on the state of quantum computing. Read More
Cyber experts discuss possible cyberattack against X Jordyn Alger March 12, 2025 X experienced a cyberattack that caused widespread technical issues across the network. Read More
Cyber leaders weigh in on proposed vulnerability disclosure policy Jordyn Alger March 11, 2025 Cybersecurity leaders discuss the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025. Read More
Typosquatted packages delivering malware to Linux and macOS systems Jordyn Alger March 10, 2025 Research has identified a typosquatting campaign delivering malware to Linux and macOS systems. Read More
Cybersecurity experts discuss the YouTube CEO deepfake Jordyn Alger March 7, 2025 Cybersecurity experts share their insights on the YouTube CEO deepfake scam. Read More
A Chinese espionage group is targeting the IT supply chain Jordyn Alger March 7, 2025 Silk Typhoon, Chinese espionage group, is targeting common IT solutions. Read More
Special Report Dr. Anmol Agarwal — Top Cybersecurity Leaders 2025 Dedication and curiosity fuels success in cybersecurity Jordyn Alger March 6, 2025 Dr. Anmol Agarwal, Senior Security Researcher at Nokia, has built a successful cybersecurity career.Read More
Special Report David Baker — Top Cybersecurity Leaders 2025 From Hacking Videogames to Securing the Community Jordyn Alger March 6, 2025 David Baker, Head of Automation and Technology at Shropshire Council, discovered his love for cybersecurity at a young age.Read More