Customer data such as birth dates, credit card numbers and driver's license information were stolen when threat actors exploited zero-day vulnerabilities in Cleo-managed file transfer products.
Wave of Wine-Inspired Phishing Attacks Targets EU Diplomats
Russia-backed APT29's latest campaign once again uses malicious invites to wine-tasting events as its lure, but this time targets a different set of vintages — errr, victims — and delivers a novel backdoor, GrapeLoader.
China-Backed Threat Actor 'UNC5174' Using Open Source Tools in Stealthy Attacks
Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar.
True security isn't about meeting deadlines — it's about mitigating risk in a way that aligns with business objectives while protecting against real-world threats.
This proactive strategy integrates security across every phase of the software development lifecycle, helping detect vulnerabilities early, reduce attack surfaces, and meet regulatory standards like GDPR and HIPAA.