8 supply chain security talks you don't want to miss at Black Hat

8 supply chain security talks you don’t want to miss at Black Hat

Numerous reports have highlighted the increased number of software supply chain attacks in recent years. The Verizon Business Data Breach and Investigation Report (DBIR) 2024 concluded that breaches stemming from third-party software development organizations played a role in 15% of the more than 10,000 data breaches that Verizon documented, a ... Read More
Verizon DBIR 2024: The rise in software supply chain attacks explained

Verizon DBIR 2024: The rise in software supply chain attacks explained

The Verizon Data Breach Investigations Report (DBIR) is considered to be one of the leading annual reports on the state of cybersecurity. The report, which analyzes thousands of data breaches from the previous year, breaks down these incidents by their attack vector. In this year’s report, breaches caused by third-party ... Read More
10 Hacker Summer Camp speakers to follow year-round

10 Hacker Summer Camp speakers to follow year-round

"Hacker Summer Camp," the annual confluence in Las Vegas of three cybersecurity conferences — Black Hat, DEF CON and B-Sides Las Vegas — is both a blessing and a curse ... Read More
The Week in Security: Researchers hack 'unbreakable' card-shuffling hardware, Discord.io shut after breach

The Week in Security: Researchers hack ‘unbreakable’ card-shuffling hardware, Discord.io shut after breach

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security. This week: Researchers kick it Ocean's Eleven style with an attack on card shuffling machines. Also: A software vulnerability could be ... Read More
The Week in Security: Cloudflare Tunnels abuse ramps up, U.K. voter data exposed

The Week in Security: Cloudflare Tunnels abuse ramps up, U.K. voter data exposed

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond. This week: More and more hackers abuse Cloudflare Tunnels for nefarious purposes. Also: The data of ... Read More
The Week in Security: Malware gives remote access to air-gapped devices, cyber attackers target Italy

The Week in Security: Malware gives remote access to air-gapped devices, cyber attackers target Italy

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond. This week: Hackers use new malware to gain remote access to air-gapped devices. Also: Cybercriminals are ... Read More
The Week in Security: North Korean APT targets developers, this Barbie is a cybercriminal

The Week in Security: North Korean APT targets developers, this Barbie is a cybercriminal

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond. This week: a North Korean APT group targets developers via GitHub. Also: This Barbie is a ... Read More
The Week in Security: Google Cloud Build permissions can be poisoned, WormGPT weaponizes AI

The Week in Security: Google Cloud Build permissions can be poisoned, WormGPT weaponizes AI

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond. This week: Google Cloud Build permissions can be abused to poison production environments. Also: A new ... Read More