Skip to content

In the News

Featured

10/11/2023

Cybersecurity and Open Source Experts Up In Arms About the CRA

Provisions in the European Union’s proposed Cyber Resilience Act drew more fire from dozens of high-profile cybersecurity and technology advocates. 

Read More
Cybersecurity and Open Source Experts Up In Arms About the CRA

04/12/2024

ISC2 study pegs average US cybersecurity salary at $147K, up from $119K in 2021

Gender and ethnicity gaps persist, but female executives and middle managers earned more on average than male counterparts, according to the survey.

Read More arrow-right-tertiary

04/11/2024

How MSSPs, MSPs Can Help Defend the Water Supply

It’s hard to imagine a cyberattack on critical infrastructure target any more disastrous and cruel than to a source of drinking water. Yet, the White House says there is now evidence that state-sponsored threat actors are doing just that.

Read More arrow-right-tertiary

04/11/2024

Will There Ever Be a Solution to Zero-Day Exploits? Expert Analysis

Pushed by the rapid acceleration and abundance of new software, updates, and apps being released, the software development sector is leaving wide security gaps and weak points across architectures.

Read More arrow-right-tertiary

04/09/2024

DOJ data on 341,000 people leaked in cyberattack on consulting firm

A cyberattack on a consulting firm working for the U.S. Department of Justice resulted in the theft of personal and medical data belonging to more than 340,000 individuals.

Read More arrow-right-tertiary

04/09/2024

When GenAI and low-code collide: What could go wrong for AppSec?

Here's why the duo results in a perfect storm, key considerations — and expert advice on how engineering and application security teams can tackle the problem.

Read More arrow-right-tertiary

04/04/2024

Russian Hackers Target German Political Parties with Fake Dinners to Deploy WINELOADER Backdoors

State-sponsored Russian hackers are targeting German political parties with fake dinner invites to deploy malware, establish persistence, and exfiltrate data.

Read More arrow-right-tertiary

04/03/2024

Microsoft Online Exchange Attack Preventable: CSRB

An attack on the Microsoft Exchange Online intrusion conducted by a Chinese-based attack group was preventable, the Cyber Safety Review Board (CSRB) said in a report.

Read More arrow-right-tertiary

04/02/2024

Cyber 'axis of evil' poised for more attacks on Australia, expert warns

A dangerous "axis of evil in cyberspace" is primed to launch more attacks on major Australian companies, a leading cybersecurity expert has warned, claiming the compromised networks of Medibank and Optus are just phase one in a dark master plan.

Read More arrow-right-tertiary

03/29/2024

Don’t Let This Happen to You: Cautionary Tales of Data Loss for World Backup Day 2024

The World Backup Day is observed on March 31, serving as a reminder of the possibility or certainty of data loss from human error, system failure, or threat actors’ malicious intent. As World Backup Day 2024 approaches, read about some of the data loss horror stories members of the Spiceworks Community witnessed and how they could have been prevented.

Read More arrow-right-tertiary

10/11/2023

Microsoft: Chinese APT Behind Atlassian Confluence Attacks; PoCs Appear

Organizations should brace for mass exploitation of CVE-2023-22515, an uber-critical security bug that opens the door to crippling supply chain attacks on downstream victims.

Read More arrow-right-tertiary

10/11/2023

Cybersecurity and Open Source Experts Up In Arms About the CRA

Provisions in the European Union’s proposed Cyber Resilience Act drew more fire from dozens of high-profile cybersecurity and technology advocates. 

Read More arrow-right-tertiary

10/02/2023

Johnson Controls International Suffered a Massive Ransomware Attack Potentially Impacting the DHS

Johnson Controls International (JCI) has suffered a ransomware attack that encrypted devices and affected internal and partners’ operations.

Read More arrow-right-tertiary

Experience Contrast today

See how you could get secure code moving on the Contrast Secure Code Platform