Managing Cyber-Risk Is No Different Than Managing Any Business Risk
A sound cyber-risk management strategy analyzes all the business impacts that may stem from an...
Read MoreA sound cyber-risk management strategy analyzes all the business impacts that may stem from an...
Read MoreThe rapid proliferation of Artificial Intelligence (AI) promises significant value for industry, consumers, and broader society, but as with many technologies, new risks from these advancements in AI must be managed to realize...
Read MoreIvanti has released a security update to address an admin bypass vulnerability (CVE-2024-8963) affecting Ivanti Cloud Services Appliance (CSA) version 4.6. A cyber threat actor could exploit this vulnerability in conjunction...
Read MoreLast week, I posted a diary about suspicious Python modules. One of them was Firebase [1], the cloud service provided by Google[2]. Firebase services abused by attackers is not new, usually, it’s used to host malicious files...
Read MoreA few months ago, I wrote a diary[1] about a Python script that replaced the Exodus[2] Wallet app...
Read More