News
Spotlight Podcast: Are you ready for Threat Reconnaissance?

In this Spotlight podcast interview, David Monnier of Team Cymru talks about the evolution of the threat intelligence into actionable and target specific “threat reconnaissance.”
The post Spotlight Podcast: Are you ready...

Read more
News
Is a DEF CON Village the right way to assess AI risk?

The AI industry is pointing to the AI Village at DEF CON as a venue for assessing cybersecurity risk. But is a "village" the best way to test AI risk? Experts...

Read more
News
Researcher: malicious packages lurked on npm for months

Researchers at ReversingLabs said they discovered two npm open source packages that contained malicious code linked to open source malware known as TurkoRat.
The post Researcher: malicious packages lurked on npm...

Read more
News
The surveys speak: supply chain threats are freaking people out

A bunch of recent surveys of IT and security pros send a clear message: threats and risks from vulnerable software supply chains are real, and they’re starting to freak people out.
The...

Read more
News
Episode 249: Intel Federal CTO Steve Orrin on the CHIPS Act and Supply Chain Security

Paul speaks with Steve Orrin, the Federal CTO at Intel Corp about representing Intel and its technologies to Uncle Sam and the impact of the CHIPS Act a massive new federal...

Read more
News
Malicious Automation is driving API Security Breaches

Removing the ability to automate against a vulnerable API is a huge step forward, as automation is a key enabler for both the exploitation and the extraction of large amounts of...

Read more
News
Cyberattacks on Industrial Control Systems Jumped in 2022

Cyberattacks on industrial control systems (ICS) jumped in 2022, with an 87% jump in ransomware attacks and a 35% increase in the number of ransomware groups targeting industrial control and operational...

Read more
News
Beware: Images, Video Shared on Signal Hang Around

A researcher is warning that photos and video files shared in Signal chats may be hanging around on devices, even when they deleted the messages in which the images were shared....

Read more
News
New Report Finds Auto Cyber Is A Dumpster Fire

Automakers swear that the security of their connected vehicles is their top priority. So how come researchers just found dozens of software flaws that could give hackers access to millions of...

Read more
News
Episode 248: GitHub’s Jill Moné-Corallo on Product Security And Supply Chain Threats

In this episode of the Security Ledger Podcast, Paul speaks with Jill Moné-Corallo, the Director of Product Security Engineering Response at GitHub. Jill talks about her journey from a college stint...

Read more