Practical Guidance For Securing Your Software Supply Chain
The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their...
The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their...
Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting...
Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to the headphones...
Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese company acquired...
Cybersecurity researchers have discovered an updated version of an Android banking trojan called Medusa that has been used to target...
Tens of thousands of Levi’s customers may have had their accounts compromised after a credential stuffing attack, the clothing giant...
A popular cryptocurrency portfolio management specialist has revealed a major cyber-attack which impacted 1590 of its customers’ crypto wallets.CoinStats describes...
New fraud campaigns have been discovered involving the Medusa (TangleBot) banking Trojan, which had evaded detection for nearly a year. An...
Nearly half (44%) of organizations have experienced a cloud data breach, with 14% reporting having had an incident in the...
Vulnerability researchers at Google’s Project Zero have introduced Naptime, a new framework that will be used to enable a large...
Security researchers have uncovered a significant increase in dark web activity involving stolen identity information from Singapore citizens. In an advisory...
Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk - the...
A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver a modular trojan...
Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files...
WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five...
Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts with...
Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in...
The organization managing the world’s largest stockpile of plutonium has pleaded guilty to all criminal charges, in a first-of-its-kind case...
Security researchers have warned against Rafel, an open-source remote administration tool (RAT) targeting Android devices. The investigation by Check Point Research...
Poland’s new government appears to be ramping up its investigation into allegations that the previous administration used notorious commercial spyware...
RedJuliett, a likely Chinese state-sponsored group, conducted cyber espionage campaigns targeting Taiwan from November 2023 to April 2024, according to...
Security researchers from Group-IB have unveiled the operations of a threat actor known as Boolka, whose activities involve deploying sophisticated...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cybersecurity researchers have detailed a now-patch security flaw affecting the Ollama open-source artificial intelligence (AI) infrastructure platform that could be...