From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to...
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to...
Nov 05, 2025Ravie LakshmananCybersecurity / Cyber Espionage A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a...
Nov 04, 2025Ravie LakshmananMalware / Cyber Espionage Threat actors are leveraging weaponized attachments distributed via phishing emails to deliver malware...
How Does Managing Non-Human Identities Revolutionize Cyber Defense? How can organizations enhance their defenses while managing the myriad of...
How Are Non-Human Identities Redefining Cybersecurity? Where cyber threats continue to evolve and multiply, how can organizations effectively safeguard...
Tidal Cyber is proud to announce the release of NARC AI (Natural Attack Reading and Comprehension), the first AI...
Oct 31, 2025Ravie LakshmananEndpoint Security / Cyber Espionage The exploitation of a recently disclosed critical security flaw in Motex Lanscope...
Alan and Kip Boyle, founder and chief information security officer at Cyber Risk Opportunities, discuss how organizations can rethink...
Oct 31, 2025Ravie LakshmananVulnerability / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity...
Ransomware remains one of today’s most disruptive cyber threats, but it is far from the only one. Attackers are also...
Ex-Defense contractor exec pleads guilty to selling cyber exploits to Russia Pierluigi Paganini October 30, 2025 Former US defense contractor...
Hacktivists breach Canada’s critical infrastructure, cyber Agency warns Pierluigi Paganini October 29, 2025 Canada’s cyber agency warns hacktivists breached critical...
Cyber insurance was once a safety net, an affordable way to transfer risk when all else failed. Not anymore....
While at the recent GovRAMP cyber summit in Chicago, I was fortunate to be introduced to Chad Rychlewski, who is...
Are Your Cyber Risk Management Strategies Truly Effective? A growing concern among security professionals is whether they have implemented...