Improving the security of open source repositories and keeping malicious components out requires a combination of technology and people.
Read moreInformants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
Read morePhishing campaigns targeting travelers have evolved from simple, easy-to-spot fraud attempts to highly sophisticated operations.
Read morePhishing Domains Tanked After Meta Sued Freenom
May 27 2023The number of phishing websites tied to domain name registrar Freenom dropped precipitously in the months surrounding a recent lawsuit from social networking giant Meta, which alleged the free...
Read moreHow Safe Is Your Wearable Device?
May 26 2023To mitigate risk, both developers and users must include security principles and technologies as core foundations in new devices.
Read moreExpeditionary Cyberspace Operations
May 26 2023Cyberspace operations now officially has a physical dimension, meaning that the United States has official military doctrine about cyberattacks that also involve an actual human gaining physical access...
Read moreUkraine's head of cybersecurity Victor Zhora says the world needs "efficient legal instruments to confront cyber terrorism."
Read moreThis is the first incident where a threat actor from the country appears to be laying the groundwork for disruptive attacks in the future, researchers say.
Read moreRed Hat Tackles Software Supply Chain Security
May 26 2023The new Red Hat Trusted Software Supply Chain services help developers take a secure-by-design approach to build, deploy, and monitor software.
Read more
Recent Comments