AI is reshaping offensive security tactics and challenging defenders to respond at unprecedented speed. When: Nov. 20, 1:00-2 ...
Agentic AI is touted as a helpful tool for managing tasks, and cyber criminals are already taking advantage. Should information security teams look to AI agents to keep up?
An open source software supply-chain vulnerability is an exploitable weakness in trusted software caused by a third-party, ...
The foundations said in their blog post that automated CI systems, large-scale dependency scanners, and ephemeral container ...
The XZ attack is a backdoor that reminds us our biggest open-source security threats are from decades of unlearned lessons.
Technical permafrost cannot quickly integrate new technologies like AI, causing missed market opportunities. Upgrades are like defusing bombs; a small mistake can lead to system crashes. Outdated ...
From bogus résumés to fake IDs, North Korean and Chinese hackers are using AI chatbots to infiltrate companies and carry out ...
Law enforcement officials are addressing mounting concerns after a series of troubling cases involving criminals impersonating police officers have surfaced, raising alarms about public safety and ...
Carmakers are especially vulnerable to cyberattacks like the one that has sabotaged Jaguar Land Rover's business for the past ...
The US’s Cybersecurity and Infrastructure Security Agency has issued an emergency directive, calling the hacking campaign ...
A Dune-inspired worm recently hit CrowdStrike and npm, infecting hundreds of packages. Here's what happened - and how to protect your code.
Alan examines why the software supply chain has become the new perimeter in cloud-native security. From SBOMs to SLSA and Sigstore, discover how leaders can defend against attacks that target ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results