Open source software used by more than 23,000 organizations, some of them in large enterprises, was compromised with ...
Drawing lessons from the trials of 2025, some of the maturing methodologies behind those very considerable software supply ...
According to the cybersecurity firms analyzing the incident, the attacker initially tried to compromise the Coinbase ...
The compromise of GitHub Action tj-actions/changed-files has impacted only a small percentage of the 23,000 projects using it ...
Current cybersecurity development risk frameworks don’t cover all of the tactics hackers used to compromise SolarWinds, log4j ...
Large organizations among those cleaning up the mess It's not such a happy Monday for defenders wiping the sleep from their ...
In this piece, Tass Kalfoglou, the director of our APAC Business Unit, sheds light on supply chain vulnerabilities and the ...
A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially ...
A compromise of the popular GitHub Actions tool turned into a massive supply chain attack, at this point thought to be ...
CISA confirms cascading attack from reviewdog to tj-actions exposed sensitive credentials across 23,000+ repositories.
Attackers subverted a widely used tool for software development environment GitHub, potentially allowing them to steal ...
Stay informed with the latest in cybersecurity trends, vulnerabilities, and best practices. Don't miss out on this week's ...