March 2, 2023
Via: CIONo IT leader wants to tell the C-suite about a serious breach that took advantage of a known infrastructure vulnerability. Hackers develop new attack strategies so often that it’s easy to forget a fundamental truth about cybersecurity: hackers don’t have […]
March 1, 2023
Via: InfoWorldKnown vulnerabilities, compromise of legitimate package, and name confusion attacks are expected to be among the top ten open source software risks in 2023, according to a report by Endor Labs. The other major open source software risks, according to […]
November 2, 2022
Via: ComputerWeeklyRansomware changes rapidly. At a technical level, attack infrastructure can change by the minute, operationally changing attack techniques while strategically targeting certain sectors, industries or regions at appropriate times. Access brokers work across multiple groups, operators switch botnets, and malware […]
May 25, 2021
Via: ComputerWeeklyCyber attacks exploiting vulnerabilities in unpatched legacy systems, via consumer applications such as TikTok, and originating from friendly countries may be a bigger risk to the average organisation than attacks through novel zero-days conducted by Chinese or Russian APT groups, […]
March 30, 2023
March 28, 2023
March 16, 2023
March 7, 2023
March 30, 2023