Cybersecurity
LockBit, RansomHub Lead Ransomware Attacks in July
Global ransomware attacks surged by 19% in July compared to June, climbing from 331 to 395 incidents, according to the latest data from NCC Group ...
5 Key Findings from the 2024 State of Bot Mitigation Survey
The 4th annual survey exclusively from the perspective of technology professionals who are already using anti-bot solutions at their companies ...
Evolving Cybersecurity: Aligning Strategy with Business Growth
The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacking for tomorrow. Organizations must stay ahead ...
Miggo Uncovers AWS Load Balancer Security Flaw
Miggio has discovered a configuration-based vulnerability that enables cybercriminals to bypass authentication and authorization services provided by the Application Load Balancer (ALB) from Amazon Web Services (AWS) that could affect more than ...
Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips
This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart ...
Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July
Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...
Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem
Implementing shared threat intelligence across an alliance of cybersecurity experts creates a more robust security approach ...
The Risks of Running an End Of Life OS – And How To Manage It
EOL operating systems no longer receive critical security updates, leaving them highly vulnerable to evolving cybersecurity threats. End-of-life OSs often struggle to run modern software and hardware, resulting in compatibility issues, reduced ...
Report: Manufacturing Remains Atop Cyberattack Leader Board
A report published today by Critical Start, a provider of managed cybersecurity services, finds cyberattacks in the first half of 2024 continued to focus on vertical industries that are rich in critical ...
The Critical Role of Governance, Risk Management, and Compliance in Operational Technology (OT) in Critical Infrastructure Organizations
As the industrial sector rapidly evolves through Industry 4.0, integrating digital technologies into operational environments becomes increasingly complex. For C-level […] ...