Cyberattacks & Data Breaches
Person using a laptop computer with social engineering icon on virtual screen
Application SecurityAttacker Social-Engineered Backdoor Code Into XZ UtilsAttacker Social-Engineered Backdoor Code Into XZ Utils
Unlike the SolarWinds and CodeCov incidents, all that it took for an adversary to nearly pull off a massive supply chain attack was some slick social engineering and a string of pressure emails.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.