How threat actors are using npm to launch attacks
WhiteSource released a threat report based on malicious activity found in npm, the most popular JavaScript package manager used by developers worldwide. The report is based on …
Exposed corporate credentials threatening the pharma sector
Constella Intelligence released a report which includes new and additional findings pertaining to exposures, breaches, and leakages within the pharma sector, specifically …
Bank executives mostly concerned about cybercrime
A research released by Computer Services suggests growing concerns among bank executives around recruiting and retaining talent as well as fighting cybercrime threats. In the …
Code review: How satisfied are development teams?
Code review remains the biggest influence on improving code quality with unit testing a distant second, a SmartBear survey reveals. With development teams getting larger and …
How are collaboration apps fairing in remote work environments?
Despite a gradual return to the office, be it on a hybrid or full-time basis, apps and tools that support remote work have continued to experience fast growth, according to …
Persistent data breaches fueling developer interest in cybersecurity
O’Reilly announced the findings of its annual platform analysis, which examines the top search terms and most-consumed content on the company’s learning platform. Interest in …
How ready are federal agencies for zero trust implementation?
More than 70 percent of federal agencies are aggressively adopting zero trust principles, while another 26 percent are adopting where they feel it makes sense, according to a …
Top attack trends every organization should build resilience against
Expel announced the release of the cybersecurity trends and predictions for 2022. Based on aggregated data from its security operations center (SOC), the report provides …
Understaffing persistently impacting enterprise privacy teams
A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The …
How costly is an insider threat?
Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent …
Number of data compromises reaching all-time high
According to an Identity Theft Resource Center (ITRC) report, the overall number of data compromises (1,862) is up more than 68 percent compared to 2020. The new record number …
Manufacturing firms turning to the cloud to increase their business agility
European manufacturing firms are embracing cloud-based technologies and services to accelerate their go-to-market plans and improve digital marketing efforts, according to an …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security