A vulnerability discovered in GitHub Actions could allow an attacker to poison a developer's pipeline, highlighting the risk that insecure software pipelines pose.
Read moreOne Year After Log4Shell, Most Firms Are Still Exposed to Attack
December 2 2022Though there have been fewer than expected publicly reported attacks involving the vulnerability, nearly three-quarters of organizations remain exposed to it.
Read moreIBM Cloud Supply Chain Vulnerability Showcases New Threat Class
December 1 2022The Hell's Keychain attack vector highlights common cloud misconfigurations and secrets exposure that can pose grave risk to enterprise customers.
Read moreOf Exploits and Experts: The Professionalization of Cybercrime
December 1 2022No longer the realm of lone wolves, the world of cybercrime is increasingly strategic, commoditized, and collaborative.
Read moreAs consumers catch on to the dangers, protection could become a major topic for legislative bodies.
Read moreGuidehouse Insights Anticipates Market for Automotive Cybersecurity Solutions Will Grow to More Than $445 Billion by 2031
December 1 2022Market drivers include new regulations, increasing automobile complexity, and new vehicle types.
Read moreCyberRatings.org Announces Results from First-of-its-Kind Comparative Test on Cloud Network Firewall
December 1 2022Ratings ranged from AAA to CC, with security effectiveness scores from 27% to 100%.
Read morePhylum Expands Its Software Supply Chain Security Capabilities, Introduces Automated Vulnerability Reachability
December 1 2022Know what you need to fix today and what you don’t.
Read moreCI Fuzz CLI Brings Fuzz Testing to Java Applications
December 1 2022CI Fuzz CLI, the open source fuzzing tool with just three commands, integrates fuzz testing directly into the software development workflow.
Read more
Recent Comments