The ransomware threat is declining as actors pivot to infostealing, according to IBM, which says that attacks on cloud services and critical infrastructures are...
Hi, what are you looking for?
The ransomware threat is declining as actors pivot to infostealing, according to IBM, which says that attacks on cloud services and critical infrastructures are...
Supply chain security insights: A successful attack against a supplier can lead to multiple opportunities against the supplier’s downstream customers.
The existence of a previously unknown infection technique used by spyware firm NSO Group is suggested by a single line in a contract between...
Details of eight vulnerabilities found in the open source supply chain used to develop in-house AI and ML models have been disclosed. All have...
DDoS attacks have evolved from social protests through criminal extortion, hack attack smokescreens and competitor suppression to geopolitical vengeance.
Could cybersecurity professionals benefit from FUD awareness training in the same way that users benefit from phishing awareness training?
A malware tactic dubbed ‘hunter-killer’ is growing, based on an analysis of more than 600,000 malware samples. This may become the standard approach for...
An active cloud account takeover campaign has impacted dozens of Azure environments and compromised hundreds of user accounts.
SecurityWeek talks to Rob Dyke, discussing corporate legal bullying of good faith researchers.
Reken, an AI-defense cybersecurity startup still in stealth mode raises $10 million before revealing its product.
Anyone who believes ransomware will go away doesn’t understand the nature of criminality. Extortion has and always will be a primary criminal business plan.
Two new products aim to secure the traditional OSS supply chain, and the new AI model software supply chain.