-
News Article Mar 06, 2024
So far, the CryptoChameleon phishing scam has successfully phished over 100 victims, with many still active.
Lookout has discovered a multi-pronged phishing campaign, dubbed “CryptoChameleon,” that mimics legitimate login pages for cryptocurrency platforms and the Federal Communications Commission (FCC) via mobile devices.
-
News Article Mar 06, 2024
The U.S. National Institute of Standards and Technology (NIST) has released version 2.0 of its landmark Cybersecurity Framework (CSF), a comprehensive update aimed at helping organizations better manage and reduce cybersecurity risks across all sectors and sizes.
-
Blog Post Mar 05, 2024
Small businesses face constant cyber threats. To safeguard, adopt a layered, automated cybersecurity approach. Explore resources & best practices in 2024.
-
News Article Mar 05, 2024
A phishing kit dubbed CryptoChameleon has been discovered targeting cryptocurrency platforms, including employees of Binance and Coinbase — as well as the Federal Communications Commission (FCC).
-
Podcast Mar 04, 2024
Root Causes 366: What Is eIDAS?
eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital identity ecosystem. What is eIDAS, and why does it exist?
-
News Article Mar 01, 2024
NIST this week announced the release of version 2.0 of its Cybersecurity Framework (CSF). This is the first major update to the CSF since its creation a decade ago.
The cybersecurity framework was originally created for critical infrastructure organizations, but CSF 2.0 is designed to help all organizations reduce risks, regardless of sector, size, or level of security sophistication.
-
News Article Feb 29, 2024
The Cybersecurity & Infrastructure Security Agency (CISA) recently announced that cyberattackers are evolving techniques to gain initial cloud access. The advisory discusses the recent adjustments made by the group APT29, also known as the Dukes, Cozy Bear or Midnight Blizzard.
-
Blog Post Feb 29, 2024
Explore Certificate Lifecycle Management (CLM) for cybersecurity. Consider TCO, including purchase, maintenance, labor costs for informed decisions.
-
Blog Post Feb 29, 2024
Prioritize cyber hygiene for robust security. Automate practices, stay quantum-ready, and collaborate for resilience.
-
News Article Feb 28, 2024
NIST’s Applied Cybersecurity Division has updated its framework to better suit the needs of a wider range of users, reflecting recent cybersecurity challenges and management practices.
-
News Article Feb 27, 2024
CISA warned that a notorious threat group associated with the Russian Foreign Intelligence Services is increasingly targeting cloud services to gain initial access to victim organizations in the government, healthcare and education sectors.
-
Podcast Feb 26, 2024
Root Causes 365: What Is Subdomain Hijacking?
In this episode we explain subdomain hijacking, including dangling subdomains and how they can constitute vulnerabilities.