Top Security Mistakes Developers Make with Code Signing Certificates
Software supply chain attacks keep climbing and attackers are getting better at slipping malicious code into trusted software. Code signing…
Software supply chain attacks keep climbing and attackers are getting better at slipping malicious code into trusted software. Code signing…
The Salesforce ecosystem just got a harsh reminder that the weakest link rarely lives inside the core platform. It often…
The ShadowPad malware campaign represents an urgent and advanced cybersecurity threat, exploiting a critical vulnerability in Microsoft’s WSUS service to…
This quote is from House of Huawei: The Secret History of China’s Most Powerful Company. “Long before anyone had heard…
Earlier this month, Microsoft uncovered SesameOp, a new backdoor malware that abuses the OpenAI Assistants API as a covert command-and-control…
A critical vulnerability, identified as CVE-2025-65998, has been discovered in Apache Syncope, a widely-used open-source identity management system, potentially exposing…
Democracy is colliding with the technologies of artificial intelligence. Judging from the audience reaction at the recent World Forum on…
A China-nexus threat actor has been conducting a sophisticated, multi-year espionage campaign using a custom malware downloader, compromising regional infrastructure…
The International Association of Cryptologic Research—the academic cryptography association that’s been putting conferences like Crypto (back when “crypto” meant “cryptography”)…
The discovery of CVE-2025-41115 exposes a critical security weakness in the Grafana Enterprise SCIM (System for Cross-domain Identity Management) component,…