A threat group known as Barium is exploiting trusted software updates and apps to conduct a wave of supply chain attacks, which could affect more than 1 million users around the world.
To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?
Organizations looking to invest in enterprise blockchains to unify and secure transactions and data records should do their homework before trusting a vendor with their most sensitive information.
Researchers speculated that poor supply chain security could be to blame for a new malware campaign that targets insecure USB drives to infect Windows machines.
To protect their networks from insider threats, security teams need greater visibility into privileged accounts held by both employees and third-party vendors.
Cybercriminals altered Texthelp's Browsealoud web screen reader to install a cryptocurrency miner on many high-profile websites, including government sites in the U.S. and U.K.
To avoid becoming the next piece of cybersecurity news, IT leaders must assess the security posture of third-party providers.
Owners of small and medium-sized businesses (SMBs) should follow these IT security best practices to protect their data and gain a competitive advantage.
According to a bug hunter, Google Apps Scripts has a vulnerability that could give hackers easy access to users' devices and contacts.