Everything there is to find on tag: cybersecurity.

Dropping the SBOM, why software supply chains are too flaky
The software supply chain and software bill of materials (SBOM) has never been so fervently debated, conflate...
Everything there is to find on tag: cybersecurity.
The software supply chain and software bill of materials (SBOM) has never been so fervently debated, conflate...
A major data leak has exposed the inner workings of the notorious ransomware group LockBit. The leak contains...
Atos introduces the SecureHorizons NIS2 Compliance Manager, powered by ServiceNow. This new application repla...
Russian DDoS attacks have hit travel company Corendon and transport company Arriva. The hackers, who call the...
Rackspace and Rubrik are joining forces to help organizations recover faster from cyberattacks. The new solut...
Software supplier SAP warns of active exploitation of a critical vulnerability (CVE-2025-31324) in SAP NetWea...
A series of vulnerabilities in Apple's AirPlay Protocol and AirPlay Software Development Kit (SDK) make Apple...
Vectra AI is talking about a "completion" of its portfolio with the new Vectra AI Analyst. With this, the com...
Ransomware attacks are greatly aided by infostealer malware. A new report from security firm KELA shows that ...