|
You are here |
blog.f-secure.com | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real world attacker mentality to reduce risk and fortify code. | |
| | | | |
blog.eclecticiq.com
|
|
| | | | | The Analyst Prompt lissue #23 looks at the effect supply chain attacks and third-party software have on organizations, the change in the cyber threat landscape during the holiday season, and the increase in prevalence of attacks targeting the healthcare sector. | |
| | | | |
thehackernews.com
|
|
| | | | | Oil & gas companies beware! Hackers are using the updated Rhadamanthys info-stealer in phishing attacks. | |
| | | | |
opensource.org
|
|
| | | The European Commission's proposed Cyber Resilience Act (CRA) as drafted may harm Open Source, and perhaps all other non-industrial software. A list of most relevant responses. | ||