News
-
6 top attributes employers want in new CISOs
Looking for your next position as a CISO, preferably one with more pay, better benefits, and more on-the-job responsibilities/respect? Then you need to know what skills and qualities prospective employers […]
-
MIT Researchers Discover New Flaw in Apple M1 CPUs That Can’t Be Patched
A novel hardware attack dubbed PACMAN has been demonstrated against Apple’s M1 processor chipsets, potentially arming a malicious actor with the capability to gain arbitrary code execution on macOS systems. […]
-
FBI: Hospital Averted ‘Despicable’ Iranian Cyberattack
Boston Children’s Hospital thwarted a cyberattack by government-backed Iranian hackers last summer after U.S. authorities received intelligence about the pending assault and alerted the hospital, says FBI Director Christopher Wray. […]
-
FDA Releases Guidance On Cybersecurity In Medical Devices
By , president, CyberActa, Inc. Source: https://www.meddeviceonline.com/doc/fda-releases-guidance-on-cybersecurity-in-medical-devices-0001
-
Working Remotely? 5 Ways to Organize Your Workspace
The percentage of people who work from home increased during the pandemic, and now they don’t want to return to the traditional office environment. More and more job seekers wish […]
-
Cyber-Attack Surface “Spiralling Out of Control”
Global organizations are still beset with cyber visibility and control challenges, with two-fifths (43%) admitting their digital attack surface is out of control as a result, according to new Trend […]
-
How the Colonial Pipeline attack has changed cybersecurity
It’s been just over a year since the American public got a taste of what a cyberattack could do to their way of life. A ransomware sortie on Colonial Pipeline […]
-
IOS16 Privacy Tool helps you cut ties with an abusive partner
I founded Wizer in early 2019 with a mission to make basic security awareness training free for everyone. Since then Wizer has been rapidly growing with over 3000 organization who […]
-
The Surreal Case of a C.I.A. Hacker’s Revenge
Nestled west of Washington, D.C., amid the bland northern Virginia suburbs, are generic-looking office parks that hide secret government installations in plain sight. Employees in civilian dress get out of […]
-
Karakurt Data Extortion Group
Actions to take today to mitigate cyber threats from ransomware: • Prioritize patching known exploited vulnerabilities. • Train users to recognize and report phishing attempts. • Enforce multifactor authentication. Source: […]

Follow me on Twitter
My Tweets- 3 Best Tools to Convert Binary into Text
- WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability
- US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes
- Less Than Half of Organizations Have Open Source Security Policy
- How to Start Your Business and Earn Money From Home