Jun 22, 2023Harpie Launches Background Check API to Safeguard Crypto Users and Combat ScamsHarpie, a provider of crypto security solutions, has unveiled its latest enterprise tool, the Background Check API. This API aims to...
Jun 22, 2023Sonatype Discovers Malicious Packages Targeting Open Source Software RegistriesSonatype, a leading provider of automated open source and malware detection systems, has recently uncovered hundreds of malicious...
Jun 22, 2023UPS Canada Faces Data Breach, Exposing Customer Information to Phishing AttacksIn a surprising turn of events, UPS Canada has notified its customers of a data breach that potentially exposed their personal...
Jun 22, 2023The Importance of Empowering Organizations with Network Visibility and Threat Hunting CapabilitiesIn today's ever-evolving landscape of cybersecurity threats, network visibility and threat hunting have become paramount for...
Jun 22, 2023The Cyber Jack Podcast - How Threat-Informed Defense Can Shape Cyber Strategy - Jon Baker, MITRECyber defense is complex and easy to get wrong. Threat-informed defense is an approach to cybersecurity that involves gathering and...