How to choose secure, verifiable technologies?

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring softwa… Continue reading How to choose secure, verifiable technologies?

How LockBit used Citrix Bleed to breach Boeing and other targets

CVE-2023-4966, aka “Citrix Bleed”, has been exploited by LockBit 3.0 affiliates to breach Boeing’s parts and distribution business, and “other trusted third parties have observed similar activity impacting their organization,&#8… Continue reading How LockBit used Citrix Bleed to breach Boeing and other targets

SimSpace collaborates with ACSC to provide cyber range exercises for organizations

SimSpace announced that the company is partnering with the Advanced Cyber Security Center (ACSC), New England’s non-profit committed to advancing collaborative defense for its members, to provide advanced cyber range exercises for cyber defenders to te… Continue reading SimSpace collaborates with ACSC to provide cyber range exercises for organizations