Blog (927)
In late March, a significant incident involving the ERC-20 token Nua took place. This event was a price Oracle manipulation attack, exploiting vulnerabilities in the DeFi protocol's pricing mechanism. The attacker manipulated the liquidity pool bala
In the realm of cybersecurity, the quest for the best antivirus to shield against ransomware remains a paramount concern for organizations worldwide. While antivirus software plays a crucial role in detecting and mitigating threats, it's essential
In today's webinar, we embarked on a journey through the evolving landscape of cybersecurity threats, focusing on the surge of ransomware attacks and critical vulnerabilities affecting organizations worldwide. Led by Jendra Chan, Head of Research
Welcome to a comprehensive exploration of critical vulnerabilities that demand immediate attention from cybersecurity professionals worldwide. In this discussion, we delve into the intricacies of vulnerabilities affecting widely used technologie
Welcome to a deep dive into the ever-evolving landscape of ransomware threats and the critical CVEs that serve as gateways for cyber adversaries. In this exploration, we unravel the tactics employed by ransomware actors and the imperative need fo
Welcome to the forefront of cybersecurity defense, where vigilance and proactive measures are paramount in safeguarding against ransomware attacks. In today's discussion, we delve into the intricate strategies employed by ransomware actors to ex
Greetings, esteemed members of the CISO Platform, a beacon of knowledge and collaboration in the realm of information security. Today, we embark on a journey to dissect the modus operandi of ransomware attackers and shed light on their sophisticat
Greetings, esteemed members of the CISO Platform, the premier online community for information security executives. Today, we are honored to host Jendra Chan, Head of Research at Fire Compass, as he delves into the intricate world of cybersecurity
New Cryptojacking Malware Breakdown - The GhostEngine cryptocurrency mining malware disables endpoint security protections, deletes logs, modifies the kernel, and digs-in to establish persistence.
It all begins with getting the victim machine to launc
Attention IT departments, the FBI is warning US companies to be wary of inadvertently hiring North Koreans to remotely work in their IT departments, amid fears of data theft and hacking.
We are seeing organized activities designed to mask the origins
The journey of a Laravel web developer is marked by a unique blend of challenges and triumphs that shape their skills and career paths. Laravel, a comprehensive and widely used PHP framework, offers a robust platform for building varied web applicati
More SEC rules, this time mandating financial firms inform victims of data breaches within 30 days!
Why wasn't this already a requirement?
Last year, the SEC instituted requirements for publicly traded companies to inform investors of material cybersec
Gain insights into the fundamental challenges hindering organizations from achieving cybersecurity objectives, particularly in terms of visibility and noise reduction. Discover how prioritizing key metrics can enhance threat detection and response
Explore the unique cybersecurity challenges faced by SMBs in today's interconnected landscape, where the threat of ransomware looms large. Brad emphasizes the importance of adopting a smarter approach to security validation, focusing on optimizing r
Discover how security training and preparedness initiatives play a pivotal role in equipping individuals to recognize and respond to cyber threats effectively. Brad emphasizes the importance of instilling a cybersecurity mindset across all levels
Explore the fundamental concept of attack surface management and its role in fortifying organizational cybersecurity. Brad sheds light on the importance of evaluating and controlling the attack surface to mitigate potential threats effectively.
Join us as cybersecurity expert Brad shares insights drawn from his passion for both cybersecurity and magic. Discover the striking similarities between performing magic tricks and defending against cyber threats.
.
Here is the verbatim discuss
As we delve deeper into the digital era, the landscape of cybersecurity continues to evolve at a rapid pace. From the rise of continuous validation to the imperative of secure data lifecycle management, organizations are facing unprecedented chall
Navigating the complex landscape of cybersecurity can often seem daunting, especially for organizations grappling with the evolving nature of threats and the intricate interplay of technology and human behavior. However, amidst the complexity,
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
%20Systems.png?profile=RESIZE_710x)

.png?profile=RESIZE_710x)
.png?profile=RESIZE_710x)
.png?profile=RESIZE_710x)
.png?profile=RESIZE_710x)

.png?profile=RESIZE_710x)





.png?profile=RESIZE_710x)

