Understanding the Human Communications Attack Surface
November 1 2021Companies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.
Read moreCompanies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.
Read moreVirtually all compilers -- programs that transform human-readable source code into computer-executable machine code -- are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities...
Read moreVirtually all compilers -- programs that transform human-readable source code into computer-executable machine code -- are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities...
Read moreEnterprises are allocating more IT dollars towards implementing a multilayered approach to securing data and applications against new threats, data shows.
Read moreMore anti-ransomware activity by law enforcement, this time in Switzerland and Ukraine.
Read moreNew capabilities allow Snyk Infrastructure as Code customers to more effectively detect infrastructure drift.
Read moreIn what maybe peak hype, Squid Game has its own cryptocurrency. Not in the fictional show, but in real life. As usual, you can also use this squid post to...
Read moreA Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
Read moreCourt documents say Vladimir Dunaev is alleged to have been a malware developer for the Trickbot Group.
Read moreWhile car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars...
Read more
Recent Comments