June 1, 2023
The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential
This week: Barracuda’s appliances had an undetected flaw, which was abused by hackers for months. Also: Could AI bring on an ‘extinction event?’
May 25, 2023
This week: North Korean APT Lazarus uses Microsoft IIS servers to carry out espionage. Also: What’s the future of PyPI amidst continuing attacks?
May 11, 2023
U.S. and other countries take down Russia’s Snake malware, used to conduct global espionage. Also: GitHub auto-blocks API key and token leaks for all repos.
May 8, 2023
Today's SOCs need the right tools for malware and supply chain security. Here's why — and best practices for a modern SOC.
May 2, 2023
Learn why Software Bills of Materials are essential for cybersecurity incident response — and how to put them to work.
May 1, 2023
The stakes were raised at RSAC 2023: A “hot” cyber war in Ukraine, supply chain attacks on the rise — and let's not forget about artificial intelligence.
April 27, 2023
The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries
This week: Canadian gas pipeline explosion could have been caused by a cyber attack. Also: Financial services firm NCR hit with a ransomware attack.
April 19, 2023
Secrets are increasingly exposed in code, creating a field-day for malicious actors. Here are key takeaways from our Secrets Exposed special report.
April 18, 2023
There is so much to take in at RSAC. Cut through the noise with our list of threat-focused talks you don't want to miss.
April 6, 2023
The Week in Security: Social engineering-attacks up with the rise of AI tools, Genesis Market seized
This week: Research connects the rise of AI tools and an increase in social engineering attacks. Also: A stolen credentials site is seized by the FBI.
April 5, 2023
CISA has better aligned the CPGs with NIST's Cybersecurity Framework, and added software supply chain goals. Here's what to know — and key insights.
April 3, 2023
Here's how robust threat hunting and malware analysis can enhance your SOC triage process — and help you mitigate software supply chain threats.