
Has public USB ‘juice jacking’ made it into the wild?
Déjà vu, but carry protection, dev teams traveling with credentials: Public-USB hacks could finally have gone rogue, per the FBI.

Déjà vu, but carry protection, dev teams traveling with credentials: Public-USB hacks could finally have gone rogue, per the FBI.

Here's why some security practitioners question the term — and what they think app sec teams should focus on instead.

Experts break down the incident, and explain how app sec tools are evolving to detect and prevent such attacks.

Research connects the rise of AI tools and an increase in social engineering attacks. Also: A stolen credentials site is seized.

CPGs are now better aligned with NIST's Cybersecurity Framework (CSF), and supply chain goals have been added. MFA guidance is also new.

First, Twitter's source code was leaked. Then it open-sourced its ranking algorithm. Should we worry about the unintended consequences of “transparency”?

Here's what you need to know about BuildKit and its Supply Chain Levels for Software Artifacts (SLSA) provenance capabilities for SBOMs.

The compromise was limited to their app. But there's a bigger lesson: Supply chain security complacency comes with a cost.

Here's how robust threat hunting and malware analysis can enhance your triage process — and help you get a handle on software supply chain security.

The VOIP software company missed signs that its client had been tampered with before it pushed the update to customers.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Purr-fect? Or cat-astrophe? Microsoft wants you to cat nap as its Security Copilot combats software security threats.

Flaws quickly spread across the supply chain. Here's how researchers at Alpha Omega and beyond are automating fixes.

A Visual Studio Code Extensions Marketplace flaw highlights the risk potential. Here's how the VS Code IDE can proliferate to npm.

ReversingLabs YARA detection rule for NB65 can help you find this ransomware in your environment.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial