This is the first incident where a threat actor from the country appears to be laying the groundwork for disruptive attacks in the future, researchers say.
Read moreRed Hat Tackles Software Supply Chain Security
May 26 2023The new Red Hat Trusted Software Supply Chain services help developers take a secure-by-design approach to build, deploy, and monitor software.
Read moreRussian code that could tamper with industrial machines and toggle RTUs on and off was floating around VirusTotal for years before being noticed. It raises new questions about the...
Read moreThe infamous North Korean APT group is using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.
Read moreThe streaming giant is looking to bolster flagging subscription growth and profits, but security researchers say the move offers a perfect opportunity to encourage better password hygiene and account...
Read morePerception Point's 2023 Annual Report: Cybersecurity Trends & Insights' analyzes the most prevalent cyberattack trends amidst today's complex threat landscape, identifying an overall increase of 87% in the total...
Read moreBank of Ghana's security operations center will boost visibility into threats and enable threat intelligence sharing, it says.
Read moreS3 Ep136: Navigating a manic malware maelstrom
May 26 2023Latest episode - listen now. Full transcript inside...
Read moreA campaign against customers of Portuguese banks uses a capable financial malware strain dubbed PeepingTitle, written in the Delphi programming language.
Read more
Recent Comments