News

AttackIQ has released a new attack graph that emulates the behaviors exhibited by Warlock ransomware, which emerged in June ...
For years, security teams focused on defending against malicious code injected into open source projects and package ...
On August 26, 2025, Nx, the popular build platform with millions of weekly downloads, was compromised with ...
As students head back to school, Contrast Security customers are getting ready for more sophisticated cyberattacks. Dark ...
This blind spot, malicious content lurking in otherwise legitimate email attachments, is one of the most persistent and ...
GPT-5’s arrival on the scene adds an important new dimension to the landscape, so we have updated our analysis to include it.
As students head back to school, Contrast Security customers are getting ready for more sophisticated cyberattacks. Dark ...
The post What is Security Automation? Why Your Business Can’t Afford to Ignore It appeared first on AI Security Automation.
Microsoft recently introduced a new framework designed to assess the security of AI models. It’s always encouraging to see ...
The process of de-identifying test databases can be approached in a variety of ways, and we’re often asked how our approach differs as compared to others. In this article, we’ll explore how our ...
Summary “The Defenders Log” Episode 1 features host David Redekop and guest Chet Wisniewski discussing the dynamic world of cybersecurity. Wisniewski, with decades of experience, traces his journey ...
DigiCert revealed today that over the last month it has thwarted two separate distributed denial of service (DDoS) attacks that peaked at more than 2.4 DDoS attacks are scaling fast.DigiCert blocked ...