The Other Lesson from the XZ Utils Supply-Chain Attack
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in…
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in…
Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so…
Behavioral detection and response is not a new concept, and the top three detection and response players command a combined…
Several vendors for consumer and enterprise PCs share a compromised crypto key that should never have been on the devices…
The campaign is laser-targeted, bucking the trend of "spray-and-pray" malicious open source packages turning up in code repositories seemingly every…
The Chinese hacking group tracked as 'Evasive Panda' was spotted using new versions of the Macma backdoor and the Nightdoor…
A unified standard is essential for realizing the full potential of SBOMs in enhancing software supply chain security.
As geopolitical tensions rise, foreign software presents a grave supply chain risk and an ideal attack vector for nation-state adversaries.
The Coalition for Secure AI is a consortium of influential AI companies aiming to develop tools to secure AI applications…
After an extended period underground, the Chinese hackers have added a more sophisticated infection chain and additional EDR evasion techniques.