A high-severity vulnerability in an R programming language process could expose organizations using the popular open source language to attacks via the software supply...
PRESS RELEASEPARAMUS, N.J.--(BUSINESS WIRE)-- Checkmarx, the leader in cloud-native application security, has integrated its enterprise application security platform, Checkmarx One, with leading cloud security...
Japanese cybersecurity officials warned that North Korea's infamous Lazarus Group hacking team recently waged a supply chain attack targeting the PyPI software repository for...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...
ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...
Social engineering is present in 90% of phishing attacks today. However, business email compromise (BEC) attacks stand apart in the cybercrime industry for their emphasis on social...
Cloud versions of the JetBrains TeamCity software development platform manager have already been updated against a new pair of critical vulnerabilities, but on-premises deployments...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
If you thought the software supply chain security problem was difficult enough today, buckle up. The explosive growth in artificial intelligence (AI) use is...
Other recent additions to the growing ArmorCode leadership team include Chief Security and Trust Officer Karthik Swarnam, VP of Partnerships Kerrinjeet Gambhir, Head of...
"Midnight Blizzard," the threat group affiliated with Russian intelligence services (SVR) and the entity behind the attacks on SolarWinds and organizations like Microsoft and...