A newly discovered backdoor in XZ Utils, a data compression utility present in nearly all Linux distributions, has revived the ghosts of previous major...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
If you thought the software supply chain security problem was difficult enough today, buckle up. The explosive growth in artificial intelligence (AI) use is...
Important Information for CISOs: Exploring CIO Convergence, Essential Security Metrics, and the Impact of Ivanti Fallout
In today's rapidly evolving digital landscape, Chief Information Security...
In the age of digital transformation, the manufacturing industry is embracing innovative technologies to stay competitive. One such area of focus is the implementation...
Having a strong and resilient U.S. defense industrial base is a key part of our national security strategy, acting as a deterrent.If our adversaries...
The Network Resilience Coalition issued recommendations intended to improve network security infrastructure by reducing vulnerabilities created by outdated and improperly configured software and hardware. NRC members,...
HONG KONG, Dec 19, 2023 - (ACN Newswire) - Asian Financial Forum 2024 (AFF), co-organised by the Hong Kong Special Administrative Region (HKSAR) government...
COMMENTARYIn December 2020, the SolarWinds attack sent shockwaves around the world. Attackers gained unauthorized access to SolarWinds' software development environment, injected malicious code into...
Things to know:– December 14th, 2023, Ledger experienced an exploit on Ledger Connect Kit, a Javascript library to connect Web sites to wallets.– The...