PyPI Mandates 2FA, Plans Google Titan Key Giveaway
Python's most popular package manager is intent on securing the supply chain by requiring developers to enable two-factor authentication.
Python's most popular package manager is intent on securing the supply chain by requiring developers to enable two-factor authentication.
New data from security training provider shows half of untrained users in consulting, energy, and healthcare industries fall for phishing…
Unsophisticated campaigns use off-the-shelf RATs and other tools to exfiltrate data and demand a ransom to keep it private.
Fraudster innovation will continue to drive successful phishing, business email compromise, and socially engineered attacks, researchers say.
Fraudster allegedly passed off refurbished, modified Cisco equipment as new to hospitals, schools, and even the military.
Cybersecurity teams continue to emphasize intrusion prevention over incident response, despite US government action.
Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks.
CISA tells organizations running VMware servers without Log4Shell mitigations to assume compromise.
Analysts say an 18% drop in ransomware attacks seen in May is likely fleeting, as Conti actors regroup.
ShiftLeft's Manish Gupta join Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about looking…