Cybersecurity Advisory #StopRansomware: Medusa Ransomware Release Date March 12, 2025 Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors....
Blogs
Lazarus Hackers Exploiting IIS Servers: How to Protect Your Organization
Overview The Lazarus Group, a notorious state-sponsored hacking collective,...
Malvertising Strikes Again: How Cybercriminals Used GitHub to Infect 1M Windows Users
In the ever-evolving landscape of cyber threats, malicious actors are continuously finding new ways to infiltrate...
Top Cybersecurity Threats for 2025 and How to Mitigate Them
Cybersecurity threats are evolving rapidly, and 2025 is shaping up to be a year where cybercriminals up their game with more advanced tactics. However, businesses don’t have to be caught off guard. By staying informed and proactive, you can protect your organization from emerging cyber risks. This...
Blackswan’s OSINT Cybertruck Challenge – #8
Blackswan's OSINT Cybertruck Challenge - #8 Happy Hunting!
Cyber Workforce Development/Alignment: Results of a Qualitative Study — by Dr. Michael Saylor
OVERVIEW The rising risk of cybersecurity threats in U.S. organizations is worsened by a global shortage...
CISO’s Guide to Presenting Cybersecurity Metrics to Board Members
How to Use 3 Key Vulnerability Assessments to Present Cyber Security Threats Board members are increasingly recognizing cybersecurity as a top concern. Harvard Business Review surveyed 600 directors and found that 76% of board members believe they have made adequate investments in cybersecurity....
Navigating Uncertainty: An Essential Guide to Organizational Risk Assessments
Author: Tangela Sampson (Intern, Spring 2024) Introduction to Risk Assessments A Cybersecurity Risk Assessment is a structured and comprehensive procedure implemented within an organization to identify, evaluate, and manage potential risks, threats, or vulnerabilities originating from the...
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments Author: Tangela Sampson (Intern, Spring 2024) A vulnerability assessment is a process of identifying security deficiencies and evaluating and categorizing potential vulnerabilities in an organization’s...
Penetration Testing 101
In a world driven by constantly growing technology, where cyber threats and data breaches are common, proactive security measures must be taken. Cybersecurity is a critical aspect that can deeply impact or cripple any company. As businesses rely on technology more and more to store, process, and...