Pirated Final Cut Pro for macOS Offers Stealth Malware Delivery
The number of people who have made the weaponized software available for sharing via torrent suggests that many unsuspecting victims may have downloaded the XMRig coin miner.
The number of people who have made the weaponized software available for sharing via torrent suggests that many unsuspecting victims may have downloaded the XMRig coin miner.
A novel threat group, utilizing new malware, is out in the wild. But the who, what, where, and why are yet to be determined, and theres evidence of a false-flag operation.
A previously unidentified threat group uses open source malware and phishing to conduct cyber-espionage on shipping and medical labs associated with COVID-19 treatments and vaccines.
Before adopting SaaS apps, companies should set security guardrails to vet new vendors and check security integration for misconfiguration risks.
Sharing attestations on software supply chain data that are formed into a policy will give us a framework to interpret risk and develop compliance directives.
Hackers will take anything newsworthy and turn it against you, including the worlds most advanced AI-enabled chatbot.
Open source software dependencies are affecting the software security of different industries in different ways, with mature industries becoming more selective in their open source usage.
A DoD email server hosted in the cloud (and now secured) had no password protection in place for at least two weeks.
Googles Android and Chrome Vulnerability Reward Programs (VRPs) in particular saw hundreds of valid reports and payouts for security vulnerabilities discovered by ethical hackers.
Despite increased threats, an uncertain economy, and increasing automation, your organization can still thrive.