Machine-learning algorithms alone may miss signs of a successful attack on your organization.
Read moreMachine-learning algorithms alone may miss signs of a successful attack on your organization.
Read more10 Malicious Code Packages Slither into PyPI Registry
August 8 2022The discovery adds to the growing list of recent incidents where threat actors have used public code repositories to distribute malware in software supply chain attacks.
Read moreA rising tide of threats — from API exploits to deepfakes to extortionary ransomware attacks — is threatening to overwhelm IT security teams.
Read moreSlack admits to leaking hashed passwords for five years
August 8 2022"When those invitations went out... somehow, your password hash went out with them."
Read moreHYAS Infosec Announces General Availability of Cybersecurity Solution for Production Environments
August 8 2022HYAS Confront provides total visibility into your production environment, giving you insight into potential issues like cyber threats before they become problems.
Read moreWe Have the Tech to Scale Up Open Source Vulnerability Fixes — Now It’s Time to Leverage It
August 8 2022Q&A with Jonathan Leitschuh, inaugural HUMAN Dan Kaminsky Fellow, in advance of his upcoming Black Hat USA presentation.
Read moreA new workout leads to five smart lessons about the importance of converging security and fraud into a unified risk function.
Read morePipeline Operators Are Headed in the Right Direction, With or Without TSA’s Updated Security Directives
August 8 2022A worsening threat landscape, increased digitization, and the long-term positive effects of modern security strategies are pushing critical infrastructure operators to do better.
Read moreNIST’s Post-Quantum Cryptography Standards
August 8 2022Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0...
Read more
Recent Comments