


How Leading CISOs are Getting Budget Approval
Read More It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader, you’ve likely found yourself explaining why your program matters, why a given tool or headcount is essential, and...
TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
Read More Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the latest activity last month, said it’s designed to...
20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack
Read More Multiple npm packages have been compromised as part of a software supply chain attack after a maintainer’s account was compromised in a phishing attack. The attack targeted Josh Junon (aka Qix), who received an email message that mimicked npm...