Lessons From OSC&R on Protecting the Software Supply Chain
A new report from the Open Software Supply Chain Attack Reference (OSC&R) team provides a framework to reduce how much…
A new report from the Open Software Supply Chain Attack Reference (OSC&R) team provides a framework to reduce how much…
The SEC has charged four companies—Unisys Corp, Avaya Holdings, Check Point Software, and Mimecast—for allegedly misleading investors about the impact…
Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of…
Stolen credentials are a big problem, commonly used to breach networks in attacks. Learn more from Specops Software about checking…
South Korea's National Cyber Security Center (NCSC) warns that state-backed DPRK hackers hijacked flaws in a VPN's software update to…
A Chinese hacking group tracked as StormBamboo has compromised an undisclosed internet service provider (ISP) to poison automatic software updates with malware.…
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and…
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in…