Tag: Blog RSS Feed

Advanced Ransomware Evasion Techniques in 2025

Ransomware has become more than a threat—it’s a calculated assault on industries, wielding AI-driven precision to bypass traditional defenses. Attackers adapt faster than ever, turning cybersecurity into a high-stakes race where falling behind isn’t an option. As we step into…

IIoT Security Threats Reshape Factory Protection Strategies

Modern factories are increasingly relying on Industrial Internet of Things (IIoT) solutions. This shift is beneficial in many regards, including higher efficiency and transparency, but it also introduces unique cybersecurity concerns. Better vulnerability management for IIoT systems is essential if…

Holding the Tide Against the Next Wave of Phishing Scams

By now, we should all be pretty well acquainted with phishing scams. They’ve been around for a very long time—nearly 30 years, in fact—and are the primary focus of most security awareness training programs and initiatives. Despite this, phishing remains…

VERT Threat Alert: February 2025 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s February 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1143 as soon as coverage is completed. In-The-Wild & Disclosed CVEs CVE-2025-21391 A vulnerability in Windows Storage could…

Building a Vulnerability Management Program from Scratch

Building a vulnerability management (VM) program from the ground up is no small feat. It requires technical expertise, organizational buy-in, and a clear roadmap. In recent months, I’ve been working with a client who had to discard their legacy approach…

Key Takeaways from the NCSC Annual Review 2024

In early December 2024, the UK’s National Cyber Security Center (NCSC) released its eighth Annual Review. While the report’s primary focus is to recap the NCSC’s activities over the past year, it also offers invaluable insights into how the UK…

“Quishing” – The Emerging Threat of Fake QR Codes

QR codes have revolutionized digital interactions, offering quick access to websites and services and adding a layer of security to many apps. These quick and seemingly innocent codes are everywhere — however, their widespread use has made them a prime…

Research Reveals Data Breaches On The Rise at UK Law Firms

British legal professionals have seen a “significant surge” in data breaches, according to new research from NetDocuments, a firm that provides a cloud-based content management platform for the legal sector. The firm has described how it analysed data from the…

How CISOs Can Build a Cybersecurity-First Culture

Creating an enterprise security-first culture is one of the most impactful things a CISO can do to protect their organization. Sure, high-tech solutions and fancy tools are important, but they are largely ineffective when staff are unable or unwilling to…

CIS Control 03: Data Protection

Key Takeaways for Control 3 At the heart of a strong data management plan is awareness surrounding the ‘ Five Ws’ of the enterprise’s data: What data does the enterprise store or handle? Who should have access to it? Where…

Zero Trust Principles for Critical Infrastructure Security

The cyber threat to critical infrastructure has never been greater. The growing sophistication of cybercriminals, deteriorating geopolitical relations, and the convergence of operational technology (OT) and information technology (IT) have created unprecedented risks for critical infrastructure organizations. Fortunately, resources are…

What Is a Security Operations Center (SOC)?

Data breaches continue to cost organizations millions of dollars each year, with costs rising steadily. According to IBM’s 2024 Cost of a Data Breach Report, the average cost of a data breach has surged to $4.88 million globally, reflecting the…

Tripwire Patch Priority Index for January 2025

Tripwire’s January 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the list are patches for the Microsoft office platform, including Word, Access, Visio, Excel, OneNote, and Outlook. These patches resolve 13 issues such as remote…

Tackling the New CIS Controls

In the early part of 2024, the Center for Internet Security (CIS) released the latest version of the well-respected Critical Security Controls (CSC). The new version, 8.1, adds contours to the prior versions, making it more comprehensive and timely in…