What to Look for When Selecting a Static Application Security Testing (SAST) Solution
If you're involved in securing the applications your organization develops, there is no question that Static Application Security Testing (SAST)…
If you're involved in securing the applications your organization develops, there is no question that Static Application Security Testing (SAST)…
The Computer Emergency Response Team of Ukraine (CERT-UA) warns of a cyberespionage campaign targeting state bodies in the country. The…
SuperMailer, a legitimate email newsletter program, has been found abused by threat actors to conduct a high-volume credential harvesting campaign,…
The US Department of Treasury has imposed sanctions on four entities and one individual involved in illicit revenue generation and…
The latest Identity Theft Resource Center (ITRC) report sheds light on the most significant identity compromise incidents consumers faced in…
It’s been a big month for US data privacy. Indiana, Iowa, and Tennessee all passed state privacy laws, bringing the…
Apria Healthcare, a large provider of home healthcare equipment and services in the US, is notifying customers that hackers may…
An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web…
Rheinmetall AG announced they suffered a data breach after being a target of a BlackBasta ransomware attack. On May 20th,…
An IT security analyst from Fleetwood, Hertfordshire in southern England has been convicted of unauthorized computer access with criminal intent…