Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
New report from Netwrix reveals unplanned expenses impact half of breached firms, including a surge in lawsuits
The growth of software supply chain attacks pushed vulnerability exploits to the third most used initial access method, Verizon found
Join Claire Williams at Infosecurity Europe to learn how F1 leadership strategies can inspire cybersecurity leaders
According to JFrog, approximately 25% of all repositories lack useful functionality and serve as vehicles for spam and malware
Tanto Security uncovered three vulnerabilities which could allow attackers to execute sandbox escapes and gain root permissions on host machines
Coffee County has discovered malicious cyber-activity on its IT systems, and it reportedly severed its connection to Georgia’s state voter registration system