threats
What You Need to Know About the XZ Utils Backdoor
Understand how to respond to the announcement of the XZ Utils backdoor ...
How to Get the Most From Your Secrets Scanning
Secret scanning is essential for unlocking next-level software supply chain security. Get tips & best practices for optimal secret scanning to secure your code ...
What is Credential Harvesting? Examples & Prevention Methods
Credential harvesting attacks can lead to all kinds of online fraud. Learn how to detect and prevent credential harvesting attacks on your business ...
Microsoft Under Attack by Russian Cyberattackers
Understand how these attackers are operating and what their tactics mean for security strategies ...
Mitigating Lurking Threats in the Software Supply Chain
The first step to addressing software supply chain vulnerabilities and threats is to understand the most common attacks. Here's where to start ...
ITRC Finds Online Job Scams on the Rise
The ITRC reported a surge in online job scams targeting unsuspecting job seekers for their personal information ...
The Silent Threat: Why Vishing is Causing Major Problems for Businesses
The alarming rise in vishing attacks underscores the need for businesses to prioritize cybersecurity and remain vigilant in the face of evolving threats ...
How to Prevent & Protect Your Website Against Content Theft
Worried about content theft? Stay one step ahead in %currentyear% & explore the latest techniques, tools, & legal considerations to protect your valuable online content ...
0-days, n-days, too many days
A software vendor, a threat actor, and a bug bounty hunter walk into a bar. The bug bounty hunter goes “have you guys heard about this new bug I just spotted?” “Never ...
Survey Surfaces Disconnect Between Cybersecurity Confidence and Reality
A survey found that despite rating their ability to detect cyberthreats highly, well over half of respondents experienced a breach in 2023 ...