Revival Hijack supply-chain attack threatens 22,000 PyPI packages
Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously…
Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously…
Cisco's deal to acquire Robust Intelligence will make it possible to use red-team algorithms to assess risk in AI models…
Another innovative industry leader I had the pleasure of speaking with was Michael Bargury, Co-Founder and CTO of Zenity, a…
Interview with Dr. Wade Holmes, member, Cyversity Board of Directors Cyversity is a 501(c)(3) organization whose mission is to achieve…
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of…
Joe Kernen of CNBC schooled Democratic Sen. Elizabeth Warren of Massachusetts on the history of price controls in a debate…
As the world of software development accelerates, the need to secure applications from the earliest stages of development has become…
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and…
A developer that researchers now track as Greasy Opal, operating as a seemingly legitimate business, has been fueling the cybercrime-as-a-service…
I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a…