NIS2 Compliance Checklist

The NIS2 Compliance Directive is a pivotal regulation aimed at enhancing cybersecurity within critical sectors across the European Union. With its stringent requirements for managing cyber risks, securing supply chains, and reporting incidents, it’s essential for organizations to ensure compliance. This article outlines the crucial steps for aligning with NIS2 standards, drawn from our comprehensive […]

Unveiling Russian Surveillance Tech Expansion in Central Asia and Latin America

Summary: Several countries in Central Asia and Latin America almost certainly base their digital surveillance capabilities on Russia’s System for Operative Investigative Activities (SORM), indicating that Russian surveillance technology has proliferated in Russia’s near abroad and among its allies. Insikt Group identified evidence of at least eight SORM providers exporting to these regions, with at […]

SAP patches severe vulnerabilities in NetWeaver and Commerce apps

SAP Security Note #3569602 covers a cross-site scripting (XSS) vulnerability in SAP Commerce, stemming from security bugs in the open-source library swagger-ui bundled with the widely used middleware. Tracked as CVE-2025-27434, the flawed explore feature of Swagger UI creates a potential mechanism for an unauthenticated attacker to inject malicious code from remote sources through a […]

Reshaping Healthcare – and Healthcare Cyber

The use of artificial intelligence is not only reshaping healthcare delivery in the sector but also healthcare cybersecurity within organizations, said Anahi Santiago, CISO of ChristianaCare, the largest healthcare delivery organization in Delaware. “There are uses of AI in the cybersecurity products to make our team more productive. We also have a lot of clinicians […]

Hispanic Heritage Month: Path to Collective Power

This year, our Hispanic Heritage Month program features a three-part series led by Nota Inclusion speakers. Futurists are invited to participate in virtual development sessions covering themes like overcoming adversity, unlocking personal potential, and harnessing the power of connection. In part one, Mando Origel, Recorded Future’s Latin Network ERG lead and Customer Success Manager, shared […]

How to Negotiate Your NIS2 Fine or Completely Avoid the Risk

In the next few years, a growing number of organizations across Europe will face investigations for non-compliance with the NIS2 Directive. If they are found to have poor cybersecurity practices, they may well be forced to pay multi-million Euro fines and other penalties. The best way to manage the risk of NIS2 penalties is, of […]

Using AI-Driven Cybersecurity Training to Counter Emerging Threats

Cary, North Carolina, March 13th, 2025, CyberNewsWire As Artificial Intelligence (AI)-powered cyber threats surge, INE Security, a global leader in cybersecurity training and certification, is launching a new initiative to help organizations rethink cybersecurity training and workforce development. The company warns that AI is reshaping both the threat landscape and the skills required for cybersecurity […]

ChatGPT saved my life, and making evil AIs by accident • Graham Cluley

In episode 40 of the AI Fix, Graham meets a shape-shifting GOAT, a robot dog gets wet, Mark likes Claude 3.7 Sonnet, OpenAI releases its dullest model yet, Grok 3 needs to go home and have a lie down, and everyone loses their minds over two AI agents booking a hotel room using 90s-era modem […]

New SuperBlack ransomware exploits Fortinet auth bypass flaws

A new ransomware operator named ‘Mora_001’ is exploiting two Fortinet vulnerabilities to gain unauthorized access to firewall appliances and deploy a custom ransomware strain dubbed SuperBlack. The two vulnerabilities, both authentication bypasses, are CVE-2024-55591 and CVE-2025-24472, which Fortinet disclosed in January and February, respectively. When Fortinet first disclosed CVE-2024-55591 on January 14, they confirmed it had […]

Cybersecurity classics: 10 books that shaped the industry

Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, a seasoned expert, or cybersecurity enthusiast, these must-reads belong on your shelf. Masters of Deception: The Gang That Ruled Cyberspace Author: Michele Slatalla Set against the backdrop of the […]

TOP