[4TH ANNUAL] 2026 SOFTWARE SUPPLY CHAIN SECURITY REPORTREAD NOW

Security Operations

The Week in Security: Chinese hackers breach government email, AI models easily poisoned

The Week in Security: Chinese hackers breach government email, AI models easily poisoned

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The Week in Security: Chinese hackers breach government email, AI models easily poisoned
The Week in Security: Third-party breach exposes  customer to LockBit, countries team to block DDoS

The Week in Security: Third-party breach exposes customer to LockBit, countries team to block DDoS

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The Week in Security: Third-party breach exposes customer to LockBit, countries team to block DDoS
The Week in Security: Third-party compromise lands pilot data from American, Southwest airlines

The Week in Security: Third-party compromise lands pilot data from American, Southwest airlines

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The Week in Security: Third-party compromise lands pilot data from American, Southwest airlines
The Week in Security: Ukraine APT attacks tied to Russia, critical eye placed on AI-generated software

The Week in Security: Ukraine APT attacks tied to Russia, critical eye placed on AI-generated software

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The Week in Security: Ukraine APT attacks tied to Russia, critical eye placed on AI-generated software
The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential

The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security

The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential
The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI

The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: Application security, cybersecurity, and beyond.

The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI
The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries

The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries
The Week in Security: Twitter gets subpoena for source code leak, 3CX supply chain attack surfaces

The Week in Security: Twitter gets subpoena for source code leak, 3CX supply chain attack surfaces

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The Week in Security: Twitter gets subpoena for source code leak, 3CX supply chain attack surfaces
Back to Top