News

Third-party supply chain attacks are the second most-cited cybersecurity risk for chief information security officers out of 350 different risks, second only to ransomware attacks.
The official website for the RVTools VMware management tool was taken offline in what appears to be a supply chain attack where ... to drop the Bumblebee malware loader on users' machines.
The official website for the RVTools VMware management tool was taken offline in what appears to be a supply chain attack that distributed a trojanized installer to drop the Bumblebee malware loader ...
Procolored, a Chinese printer manufacturer, allegedly injected Bitcoin-stealing malware into its driver software, hijacking ...
Apparently, Coward wanted to review one of Procolored’s printers and, after trying to install the accompanying software from ...
Procolored, a Chinese printer brand with a global presence, has been exposed for distributing malware through official driver ...
The SEC’s lawsuit against SolarWinds’ CISO highlights the legal liabilities CISOs can face when communicating. Here are four ...
Docker offers secure, lean and compliance-compliant images. These include Microsoft, Neo4J and GitLab, among others.
The report shows that cybercriminals have improved their strategies, efficiency, and technology for stronger attacks.
The biggest security failures rarely stem from cutting-edge attacks. They happen because of mundane, preventable errors.