Survey of Supply Chain Attacks
July 28 2020The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors: There...
Read moreThe Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors: There...
Read moreIdentity thieves who specialize in running up unauthorized lines of credit in the names of small businesses are having a field day with all of the closures and economic...
Read moreThe threat actor offers more than 26 million records from a series of data breaches.
Read moreTwo companies have teamed up to rate open source projects, but can adopting repository ratings help developers make better decisions regarding open source?
Read moreIn Japan, a cyberstalker located his victim by enhancing the reflections in her eye, and using that information to establish a location. Reminds me of the image enhancement scene...
Read moreHow stolen credentials for services like Zoom and password reuse practices threaten to compromise other accounts and applications.
Read moreRansomware crooks keep adjusting their approach to make their demands more compelling, even against companies that say they'd never pay up.
Read moreTerms such as "whitelist," "blacklist," "master," and "slave" are being scrutinized again and by a wider range of tech companies than ever before.
Read moreOur most recent articles and videos, all in one place.
Read moreThe company, already known for its vulnerability management capabilities, announces the acquisition of EDR provider Spell Security and the launch of its own service for managing endpoints and responding...
Read more
Recent Comments