The Cybersecurity Act entails new risk management and reporting obligations for many sectors. One of the first steps is registering for a list of entities.
This week, we report on malware that steals information and is being distributed under the guise of copyright infringement. Other topics include the risks associated with edge devices and the tools...
This week, we cover topics including how to communicate about a cyberattack and the upcoming Cybersecurity Act, which may require action from those subject to the NIS 2 obligations.
Cyber weather in February was mainly rainy, almost sleety, despite a few glimpses of the sun. CEO fraud, phishing campaigns in the name of public authorities and M365 account breaches continued in ...