Hidden in Plain Sight: Open-Source Software Vulnerabilities
Open-source software (OSS), software which has had its original source code made available for redistribution and adaptation, has become so popular in recent years that…
Open-source software (OSS), software which has had its original source code made available for redistribution and adaptation, has become so popular in recent years that…
By John Anthony Smith, CEO Conversant Group, and Eli Nussbaum, Managing Director, Conversant Group As businesses strive to keep up with the rapid pace of…
By Steve Soukup, CEO, DefenseStorm Innovative technology has revolutionized the way we work and live by unlocking a wealth of new capabilities. As artificial intelligence…
By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which, quite alarmingly, is like an…
By Alan Bavosa, VP of Security Products, Appdome In recent years, mobile apps have surged in popularity providing consumers with instant access to a variety…
ETSI’s annual flagship event on Cyber Security, the ETSI Security Conference, took place face-to-face from 16 to 19 October 2023, in ETSI, Sophia Antipolis, France, and gathered more than 200 people. This year the…
Why public companies should prepare now to safeguard their operations, reputation, and financial success. By Paul Truitt, Principal and National Cybersecurity Practice Leader, Mazars In…
By Michael Weigand, Co-Founder and Chief Growth Officer, Shift5 In its annual threat assessment, the Office of the Director of National Intelligence (ODNI) warned that…
By Mark Venables, CEO of The Crypto Merchant In July 2023, the cryptocurrency sector saw a significant escalation of cyber-related incidents. The loss was initially…
By Michael Nizich, PhD, CISSP As another summer comes and goes and we start to prepare for another school year, IT departments all over the…
By Milica D. Djekic The Internet of Things (IoT) is a quite new concept dealing with the devices being connected to each other and communicating…
By Eric George, Director of Solutions Engineering, Fortra Researchers at Fortra have observed cybercriminals abusing New Top-Level Domain .zip in two separate phishing campaigns targeting…