How CISOs can tackle the pernicious problem of poisoned packages
Moreover, there are no safeguards at the repository level to detect bad packages. “Anyone can write a piece of code
Continue readingMoreover, there are no safeguards at the repository level to detect bad packages. “Anyone can write a piece of code
Continue readingNew details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds
Continue readingRead more about election security: Potential ransomware attacks during the 2024 election cycle have been deemed unlikely to compromise the
Continue readingA cloud-based tool named Xeon Sender has enabled attackers to conduct large-scale SMS spam and phishing campaigns by leveraging legitimate
Continue readingEight Microsoft applications for macOS are vulnerable to library injection attacks, potentially allowing adversaries to steal app permissions and breach
Continue readingAug 19, 2024Ravie LakshmananMalvertising / Cybercrime Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing
Continue readingAug 19, 2024Ravie LakshmananThreat Intelligence / Cryptocurrency A new type of malware called UULoader is being used by threat actors
Continue readingAccording to recent research on employee offboarding, 70% of IT professionals say they’ve experienced the negative effects of incomplete IT
Continue readingMore organizations than ever subscribe to cyber insurance, yet the number of claims are plummeting, according to a new report
Continue readingAug 19, 2024Ravie LakshmananCloud Security / Threat Intelligence Malicious actors are using a cloud attack tool named Xeon Sender to
Continue reading