Security Operations

The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential

The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security

Read More about The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential
The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential
The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI

The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: Application security, cybersecurity, and beyond.

Read More about The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI
The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI
The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries

The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries
The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries
The Week in Security: Twitter gets subpoena for source code leak, 3CX supply chain attack surfaces

The Week in Security: Twitter gets subpoena for source code leak, 3CX supply chain attack surfaces

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: Twitter gets subpoena for source code leak, 3CX supply chain attack surfaces
The Week in Security: Twitter gets subpoena for source code leak, 3CX supply chain attack surfaces
The Week in Security: YoroTrooper steals credentials in Europe, AI-created videos spread malware

The Week in Security: YoroTrooper steals credentials in Europe, AI-created videos spread malware

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: YoroTrooper steals credentials in Europe, AI-created videos spread malware
The Week in Security: YoroTrooper steals credentials in Europe, AI-created videos spread malware
The Week in Security: Lazarus attacks same South Korean entity twice, use of hard-coded secrets is up

The Week in Security: Lazarus attacks same South Korean entity twice, use of hard-coded secrets is up

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: Lazarus attacks same South Korean entity twice, use of hard-coded secrets is up
The Week in Security: Lazarus attacks same South Korean entity twice, use of hard-coded secrets is up
The Week in Security: U.S. Special Ops Command server exposed emails, phishing campaign hits npm

The Week in Security: U.S. Special Ops Command server exposed emails, phishing campaign hits npm

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: U.S. Special Ops Command server exposed emails, phishing campaign hits npm
The Week in Security: U.S. Special Ops Command server exposed emails, phishing campaign hits npm
The Week in Security: Russian hackers targeted U.S. gas and electric, malicious PyPI packages show prowess

The Week in Security: Russian hackers targeted U.S. gas and electric, malicious PyPI packages show prowess

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: Russian hackers targeted U.S. gas and electric, malicious PyPI packages show prowess
The Week in Security: Russian hackers targeted U.S. gas and electric, malicious PyPI packages show prowess
The Week in Security: After breach, 'unusual activity' detected in GoTo and LastPass dev environments

The Week in Security: After breach, 'unusual activity' detected in GoTo and LastPass dev environments

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: After breach, 'unusual activity' detected in GoTo and LastPass dev environments
The Week in Security: After breach, 'unusual activity' detected in GoTo and LastPass dev environments
The Week in Security: Ransomware attacks close out 2022 with a bang, PyTorch compromise explored

The Week in Security: Ransomware attacks close out 2022 with a bang, PyTorch compromise explored

Welcome to 2023’s first edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: Ransomware attacks close out 2022 with a bang, PyTorch compromise explored
The Week in Security: Ransomware attacks close out 2022 with a bang, PyTorch compromise explored
Back to Top