A threat group known as Barium is exploiting trusted software updates and apps to conduct a wave of supply chain attacks, which could affect more than 1 million users around the world.
A DDoS botnet targeting servers used by the Electrum bitcoin wallet reached 152,000 infected hosts at the end of April.
To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?
Security researchers believe a supply chain attack known as "Operation ShadowHammer" may have distributed a backdoor to more than 1 million users.
Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security
Ditching monolith for microservices may be right for your organization, but it's critical to address the relevant security considerations early in the process.
More than 100 unique exploits of a WinRAR bug have been identified since security researchers discovered a 19-year-old vulnerability in the file compression system.
The car of today — and especially tomorrow — relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.
Security researchers discovered a new fileless malware strain targeting bank customers in Brazil and Thailand with a hack tool and at least two infostealers.
Researchers discovered new Trojan malware written in Golang that's targeting e-commerce websites with brute-force attacks.
When used as part of the software development process, machine learning can help identify vulnerabilities before threat actors have a chance to exploit them.