Coinbase originally targeted during GitHub Action supply chain attack
Dive Brief: The threat actors in the GitHub Action supply chain attack were targeting Coinbase as part of their initial wave, according to a report…
Dive Brief: The threat actors in the GitHub Action supply chain attack were targeting Coinbase as part of their initial wave, according to a report…
A Medusa ransomware campaign is using a malicious driver to disrupt and even delete endpoint detection and response (EDR) products on targeted organization networks. According…
Dive Brief: Johannes Ullrich of the SANS Internet Storm Center reported exploitation attempts this week against two critical Cisco vulnerabilities that were initially disclosed in…
Dive Brief: The GitHub Action supply chain compromise that threatened the security of more than 23,000 repositories appears to be linked to a previously undisclosed…
At least 11 state-sponsored threat groups since 2017 have been actively exploiting a Microsoft zero-day flaw allowing for abuse of Windows shortcut files to steal…
After previously being left at the altar, Alphabet Inc. reached a deal Tuesday through its Google business to buy Wiz for $32 billion in an…
Dive Brief: The Cybersecurity and Infrastructure Security Agency is reaching out to probationary workers who were terminated over the past two months following a court…
RansomHub cyber threat actors have found a new way to deploy their ransomware, and they’re using it to target U.S. government entities. According to Trend Micro,…
Dive Brief: More enterprises reported AI project failures this year compared to 2024, according to analysis from S&P Global Market Intelligence. The findings are based…
Security researchers are warning of a supply chain attack against tj-actions/changed-files GitHub Action, which is used in more than 23,000 repositories. A malicious commit was…
Dive Brief: Black Basta’s private chat logs were leaked last month, revealing the strategies, tactics and targeted vulnerabilities that the notorious ransomware-as-a-service gang used over…
If you’ve driven a car, used cloud services or even turned on a smart faucet, you’ve likely benefited from the cybersecurity expertise of someone in…