The 5Ws of the Software Supply Chain — How Security Teams Can Prevent Costly Mistakes
By , Co-Founder and CEO at Software supply chain compromises have been top-of-mind for CISOs and their security teams for...
Read more →By , Co-Founder and CEO at Software supply chain compromises have been top-of-mind for CISOs and their security teams for...
Read more →Jul 12, 2023THNRansomware / Cyber Threat Ransomware has emerged as the only cryptocurrency-based crime to grow in 2023, with cybercriminals...
Read more →A whistleblower is contacting NatWest customers affected by a data breach which has forced her to store the sensitive information...
Read more →Microsoft reported on Tuesday that a Chinese cyberespionage group it tracks as Storm-0558 was recently spotted using forged authentication tokens...
Read more →A Chinese hacking group has breached the email accounts of more than two dozen organizations worldwide, including U.S. and Western...
Read more →The Russian intelligence-backed advanced persistent threat (APT) group known variously as APT29, Nobelium or Cozy Bear, arguably most famous for the...
Read more →The Microsoft Patch Tuesday for July addressed 132 vulnerabilities as reports of zero-day exploitation surface in the media. Out of...
Read more →Implementing an AWS multi-account strategy is a popular approach that helps organizations to manage their cloud resources efficiently. In my...
Read more →Since late last month, a Russian cyber-extortion gang has been exploiting a flaw in a widely used software known as...
Read more →Microsoft announced it has mitigated a cyber attack by a China-linked threat actor, tracked as Storm-0558, which targeted customer emails....
Read more →Image: Bing Create Data from the first half of the year indicates that ransomware activity is on track to break...
Read more →Amid a concerted effort by global law enforcement to crack down on ransomware attacks, payments to hackers and even the...
Read more →