Revival Hijack supply-chain attack threatens 22,000 PyPI packages
Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously…
Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously…
A campaign that started on August 5, 2024, is spreading a previously undocumented malware named "Voldemort" to organizations worldwide, impersonating…
As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several…
I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a…
Hackers have already started to exploit the critical severity vulnerability that affects LiteSpeed Cache, a WordPress plugin used for accelerating…
A new Android malware named NGate can steal money from payment cards by relaying to an attacker's device the data…
I was thrilled to catch up with ForAllSecure during Black Hat USA 2024. ForAllSecure is an organization of hackers, developers,…
Though WormGPT tools may not be a major problem now, organizations can't let their guard down.
I was thrilled to catch up with F5 during Black Hat USA 2024. Years ago, when I started an innovative…