Current cybersecurity development risk frameworks don’t cover all of the tactics hackers used to compromise SolarWinds, log4j ...
How to avoid another SolarWinds, Log4j, and XZ Utils situation Organizations concerned about software supply chain attacks ...
Highlighting recent cyber attacks on software suppliers, here are actionable steps for organizations and individuals to ...
In 2020, cybersecurity company Mandiant's computer system was compromised by an intruder exploiting an innocuous crack: ...
Can Trust Itself Be a Cybersecurity Risk? In the ever-evolving world of cyber threat intelligence, a new study by Cornell University’s Rebecca Slayton explores a paradox at the heart of digital ...
In this piece, Tass Kalfoglou, the director of our APAC Business Unit, sheds light on supply chain vulnerabilities and the ...
Malicious campaigns targeting code used by developers of AI applications underscore the need to develop comprehensive ...
The 2020 attack on SolarWinds’ Orion infrastructure management software saw threat actors push updates to the Orion software ...
In 2020, cybersecurity company Mandiant's computer system was compromised by an intruder exploiting an innocuous crack: routine software updates ...
In today’s digital age, weak cybersecurity policies aren’t just a minor oversight; they’re an open invitation to disaster ...