Building a more secure, and sustainable, open source ecosystem
Once again, a critical security vulnerability has shone a light on the reality of open source today. Unpaid hobbyists maintaining so-called ‘Nebraska projects’, named for…
Once again, a critical security vulnerability has shone a light on the reality of open source today. Unpaid hobbyists maintaining so-called ‘Nebraska projects’, named for…
Security companies have historically focused on espionage incidents related to Windows systems. This has led to them overlooking similar threats on Linux platforms, even though…
A cyberattack affecting pathology and diagnostic services provider Synnovis has impacted healthcare services at multiple major NHS hospitals in London. While Synnovis has yet to…
Botnets, traditionally used for DDoS attacks with malware like Nitol, are now being built with malware capable of data exfiltration and installing additional malware, confirmed…
Hackers have multiple reasons for abusing malicious npm packages, as they can first use popular open-source libraries as a medium for distributing malware or backdoors…
Beware Macro! Ukrainian users and cyberinfrastructure are being hit by a new malware campaign in which hackers are using a multi-stage malware strategy to deliver…
Because wide area network (WAN) connectivity has been predominantly wired broadband, cellular connectivity has often been relegated to a failover connection option. Now, organizations recognize…
Jun 04, 2024NewsroomServer Security / Vulnerability Progress Software has rolled out updates to address a critical security flaw impacting the Telerik Report Server that could…
The cloud recently became more complicated and more important than ever; but I’ll leave the best bit to the end. One of the main security…
Hagenah says an attacker could get a huge amount of information about their target, including insights into their emails, personal conversations, and any sensitive information…
By David Lee, Chief Evangelist and Visionary for Tech Diversity The cybersecurity world is no stranger to adversity, but 2023 presented a unique set of…
Already in 2024, we successfully defended against 5.8 million Mirai-related attacks and saw a spike in honeypot activity related to Mirai, all aimed at exploiting…