ISO 27002 puts threat intelligence center stage
Compliance & Regulations
The updated ISO 27002 adds 11 new controls spanning a range of security services, including the addition of threat intelligence...
Network Graph
Eight reasons you should implement EASM
EASM
In modern cybersecurity, it’s not just about what’s inside your network—it’s about what’s exposed to the outside world. With the...
hacker image
Threat Actor Profile – Sodinokibi ransomware
Research & Threat Intel
Meet "Sodinokibi" this month, the threat group behind the eponymous Sodinokibi ransomware, also known as “REvil”, to understand their tactics...
Critical OpenSSL vulnerabilities: CVE-2022-3602 and CVE-2022-3786
Cybersecurity News
A critical vulnerability was discovered in current versions of OpenSSL affecting almost every organization. A fix is now out since...
hacker image
Threat Actor Profile – Guacamaya hacktivist group
Research & Threat Intel
Meet Guacamaya – a hacktivist group advocating for the indigenous people of Central America