ENISA: Software vulnerability prevention initiatives
The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vulnerabilities.
Results from the latest ATT&CK Evaluations for endpoint detection and response solutions.
IT services giant Atos has responded to the data breach claims made by a ransomware group named Space Bears. The post IT Giant Atos Responds to Ransomware Group’s Data Theft Claims appeared first on SecurityWeek.
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry. The Socket Research Team said it identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that embeds the same two components associated with Sha1-Hulud: the “setup_bun.js” loader and the main payload…
Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools,…
Eric Katz reports: Current federal employees, retirees and others impacted by widespread breach of personal data maintained by the Office of Personnel Management took advantage of only a small portion of the money made available in a settlement agreement following the 2015 hack. Plaintiffs in the class action lawsuit reached a settlement in 2022 with…
Joe Tidy reports on the explosion of cryptocurrency thefts and scams over the past few years. There’s a lot of material in the post, but of particular interest to DataBreaches was this part of his report: “Data is a common problem as Bitcoin millionaires are becoming so frequent, and there are stolen databases that are……