Malware leveraging flaws in edge routers has been spying on military contracting websites, according to research from Lumen’s Black Lotus...
The FBI has released a warning that scammers may be targeting individuals seeking to enroll in the Federal Student Aid program to steal their personal information,...
Security certification body (ISC)² is being accused of promoting a series of ‘undemocratic’ changes to its bylaws. (ISC)² – the International Information System Security Certification Consortium...
Researchers have linked the relatively new Ransom Cartel ransomware operation with the notorious REvil gang based on code similarities in both operations’ encryptors. REvil reached its...
A remote code execution flaw in the open-source Apache Commons Text library has some people worried that it could turn into the next Log4Shell. However, most...
In the last 12 months, more than 769,000 cyber job postings went up in the United States. Demand for cyber workers continues to surge, according to...
Researchers warn that there has been a 633% year-over-year increase in cyber-attacks launched against open source software repositories. Open source components, frameworks, libraries, and whole platforms are relied...
A critical flaw patched in the Apache Commons Text library has sparked comparisons with the ‘Log4Shell’ bug that surfaced in the near-ubiquitous open source component Log4j...
Cybercriminals are getting craftier as auto retailers continue to fall victim to well-disguised cyberattacks. According to the second annual dealership cybersecurity study by CDK Global, 15%...
As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams are more challenged than ever to build transparent trust in the...
There are three key questions concerning artificial intelligence (AI) in the supply chain: Where are we today and what are some of the tailwinds driving the implementation of...
Recent Comments