3CX Breach Was a Double Supply Chain Compromise
We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex,…
We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX, a complex,…
BOSTON – April 20, 2023 – Bitsight, a leader in managing and monitoring cyber risk, today...
American home buyers who have good credit scores will be penalized in an effort by the Biden administration to achieve…
Campaigns that wielded NSO Group's Pegasus against high-risk users over a six-month period demonstrate the growing sophistication and relentless nature…
An investigation into last month's 3CX supply chain attack discovered that it was caused by another supply chain compromise where…
Attackers are hacking into poorly secured and Interned-exposed Microsoft SQL (MS-SQL) servers to deploy Trigona ransomware payloads and encrypt all…
Unsophisticated attackers can pinpoint where a person lives by lifting metadata from Strava and other apps, even if they're using…
Attackers continued to favor software exploits, phishing, and stolen credentials as initial-access methods last year, as Log4j and the Russia-Ukraine…
Combined solutions expected to deliver complete API visibility and security coverage across all of the OWASP API top 10 attacks.
MFA isn't immune from the tug of war between attackers and defenders.