A new report out today from software supply chain company JFrog Ltd. warns that an expansion of artificial intelligence ...
Eclypsium sees a sharp spike in attacks against network infrastructure and Juniper routers are at the center of the two major ...
Automotive cyberattacks resulted in tens of billions of dollars in estimated damages from ransomware, data breaches, and ...
Customers advised to ask questions to make sure those they work with are aware of risks and have taken steps to fend off ...
The final guidance for defending against adversarial machine learning offers specific solutions for different attacks, but ...
Cyber threats in 2024 evolved with smarter phishing, browser-based malware, and persistent ransomware targeting critical ...
Ex-US Air Force officer says companies shouldn't wait for govt mandates Interview Former US Air Force cyber officer Sarah ...
CVE-2025-30066 supply chain attack compromised tj-actions on March 14, 2025, exposing 218 repositories and leaking credentials.
Even the most security-conscious companies are vulnerable to weaknesses in their supply chain. Organisations must work hard to close security gaps.
More details have come to light on the recent supply chain attack targeting GitHub Actions, including its root cause.
Current cybersecurity development risk frameworks don’t cover all of the tactics hackers used to compromise SolarWinds, log4j ...
The compromise of GitHub Action tj-actions/changed-files has impacted only a small percentage of the 23,000 projects using it ...