Generative Data Intelligence

Tag: software supply chain

R Programming Bug Exposes Orgs to Vast Supply Chain Risk

A high-severity vulnerability in an R programming language process could expose organizations using the popular open source language to attacks via the software supply...

Top News

Home Depot Hammered in Supply Chain Breach

A hacking forum leak has led Home Depot to confirm that its employee data was compromised via a third-party software vendor.Home Depot did not...

Checkmarx Announces Partnership With Wiz

PRESS RELEASEPARAMUS, N.J.--(BUSINESS WIRE)-- Checkmarx, the leader in cloud-native application security, has integrated its enterprise application security platform, Checkmarx One, with leading cloud security...

8 Strategies for Enhancing Code Signing Security

COMMENTARYThe recent news that hackers had breached remote access solution company AnyDesk shined a harsh light on the need for companies to take a...

Japan Blames North Korea for PyPI Supply Chain Cyberattack

Japanese cybersecurity officials warned that North Korea's infamous Lazarus Group hacking team recently waged a supply chain attack targeting the PyPI software repository for...

CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...

The Rise of Social Engineering Fraud in Business Email Compromise

Social engineering is present in 90% of phishing attacks today. However, business email compromise (BEC) attacks stand apart in the cybercrime industry for their emphasis on social...

Critical TeamCity Bugs Endanger Software Supply Chain

Cloud versions of the JetBrains TeamCity software development platform manager have already been updated against a new pair of critical vulnerabilities, but on-premises deployments...

CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

It’s 10 p.m. Do You Know Where Your AI Models Are Tonight?

If you thought the software supply chain security problem was difficult enough today, buckle up. The explosive growth in artificial intelligence (AI) use is...

Leading ASPM Platform ArmorCode Appoints Aaron Feigin as Chief Marketing Officer

Other recent additions to the growing ArmorCode leadership team include Chief Security and Trust Officer Karthik Swarnam, VP of Partnerships Kerrinjeet Gambhir, Head of...

Russia’s ‘Midnight Blizzard’ Targeting Service Accounts for Initial Cloud Access

"Midnight Blizzard," the threat group affiliated with Russian intelligence services (SVR) and the entity behind the attacks on SolarWinds and organizations like Microsoft and...

Latest Intelligence

spot_img
spot_img
spot_img