Top news of the week: 02.02.2023.
Hackers abuse legitimate remote monitoring and management tools in attacks
Researchers and government agencies warn that threat actors are increasing their use of commercial RMM tools to enable financial scams.
JCDC 2023 Planning Agenda to address systemic risk, collective cyber response, high-risk communities
JCDC 2023 Planning Agenda to work on joint cyber defense plans; address systemic risk, collective cyber response, and high-risk communities.
How to survive below the cybersecurity poverty line
The security poverty line has become the benchmark of acceptable cybersecurity for businesses. Here are the factors that determine that benchmark and advice for those below it.
Cyber Insights 2023: Attack Surface Management
Attack surfaces will get more complex and more distributed throughout 2023; and effective Attack surface Management (ASM) will be more complicated.
What is CSPM?
Learn about cloud security posture management (CSPM) and how it continuously monitors cloud-based systems and infrastructures for risks and misconfigurations.
CISA MITRE ATT&CK for ICS focuses on adversarial tactics, techniques disrupting industrial control process
CISA MITRE ATT&CK for ICS focuses on adversarial tactics and techniques disrupting industrial control process.
#HowTo: Fight Back Against Ransomware Attacks
Alex Hinchliffe shares a 10-point plan for organizations to fight back against ransomware attacks
News & Events
Common Weakness Enumeration (CWE) is a list of software and hardware weaknesses.