Open source software (OSS) is a prime target for supply chain cyberattacks and protecting it remains a major challenge.
SecurityWeek's Cyber Insights 2025 examines expert opinions to gain their opinions on what to expect in Attack Surface ...
Supply chain attacks exploit vulnerabilities in interconnected systems, targeting not just primary companies but the web of ...
“Operation Cookie Monster” ranks as one of the best code names in recent memory. And it’s apropo, given what exactly went down. Genesis Market was one of those marketplaces where criminals ...
If you would like to learn more about the IAEA’s work, sign up for our weekly updates containing our most important news, multimedia and more. Computer security in the nuclear supply chain is an ...
What is Zero Trust? At its core, Zero Trust challenges the assumption that anything or anyone within the network—whether ...
The ongoing cyber skills gap has worsened by eight per cent since 2024, with two-thirds of organizations reporting ...
Here are a few things CISOs can do to secure their supply chain in these trying times: Every supply chain element should have a cyber security maturity assessment exercise.
Chinese state-backed hackers have compromised US Treasury computers and accessed unclassified information, after targeting a third-party cybersecurity vendor, it has emerged. The Treasury confirmed ...
A major state-sponsored cyber incident that targeted the United States Department of the Treasury in the weeks prior to Christmas 2024 appears to have begun as the result of a compromise at a ...
Eight in 10 organizations in the Philippines were negatively affected by cybersecurity breaches within their supply chain in the past year, according to BlueVoyant, a cyber defense company.