Security certification body (ISC)² is being accused of promoting a series of ‘undemocratic’ changes to its bylaws. (ISC)² – the International Information System Security Certification Consortium...
Researchers have linked the relatively new Ransom Cartel ransomware operation with the notorious REvil gang based on code similarities in both operations’ encryptors. REvil reached its...
A remote code execution flaw in the open-source Apache Commons Text library has some people worried that it could turn into the next Log4Shell. However, most...
In the last 12 months, more than 769,000 cyber job postings went up in the United States. Demand for cyber workers continues to surge, according to...
A critical flaw patched in the Apache Commons Text library has sparked comparisons with the ‘Log4Shell’ bug that surfaced in the near-ubiquitous open source component Log4j...
Cybercriminals are getting craftier as auto retailers continue to fall victim to well-disguised cyberattacks. According to the second annual dealership cybersecurity study by CDK Global, 15%...
As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams are more challenged than ever to build transparent trust in the...
There are three key questions concerning artificial intelligence (AI) in the supply chain: Where are we today and what are some of the tailwinds driving the implementation of...
While knowing full well that human lives may be at stake, criminal gangs have been increasingly targeting the healthcare sector with high-impact attacks like ransomware. 1. Tighten up...
The term “deepfake” is used for photo, video or audio content that has been manipulated to make it seem that the subject is doing or saying...