Loading...
The day's top cybersecurity news and in-depth coverage
May 31, 2021
The Russian state-sponsored group has shifted to targeted email attacks that exploit third-party services. Read more â¶
Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
The new, hastily announced security directive requires US pipeline companies to appoint a cybersecurity coordinator and report possible breaches within 12 hours.
HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including HIPAA, GDPR, PCI-DSS, and more.
Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to user accounts.
Keep up with news of CSO, CISO and other senior security executive appointments.
© 2024