Data Breaches

Vulnerabilities

Information

Latest Posts

View All Posts
Cyber Attacks

Cyber Monday 2024 : date, durée, c’est quoi… tout savoi...

Préparez-vous, le Cyber Monday 2024 et ses promos ultra attractives approchent à...

Malware

Auditing Gradio 5, Hugging Face’s ML GUI framework

This is a joint post with the Hugging Face Gradio team; read their announcement ...

Malware

Unraveling Cyber Defense Secrets: Strategies for Defend...

Discover the recent targeting shift of the Fog Ransomware group towards the fina...

Malware

GitLab security advisory (AV24-579)

Article Link: GitLab security advisory (AV24-579) - Canadian Centre for Cyber Se...

Malware

Enabling Rule Profiling in Suricata - Compiling from So...

Article Link: https://www.youtube.com/watch?v=KwnBsSERrss 1 post - 1...

Malware

ADDO session: The state of SBOM, what's coming in stand...

In 2021, the Log4j vulnerability catalyzed the industry to take action ...

Malware

Vulnerability Prioritization & the Magic 8 Ball

Last month marks 25 years of operation for the CVE (Common Vulnerabilities and E...

Malware

CMMC 2.0: Navigating the New Cybersecurity Landscape fo...

CMMC 2.0 is a Department of Defense (DoD) initiative aimed at safeguarding Contr...

Malware

What NIST’s latest password standards mean, and why the...

Say goodbye to the days of using the “@” symbol to mean “a” in your password or ...

Malware

SonicWall security advisory (AV24-580)

Article Link: SonicWall security advisory (AV24-580) - Canadian Centre for Cyber...

Malware

Fidelity Investments confirms August breach affected 77...

Fidelity maintains that there’s no indication of a ransomware incident – and tha...

Articles

EU Adopts Cyber Resilience Act for Connected Devices

The EU's Cyber Resilience Act requires cybersecurity standards for all connected...

12

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.