supply chain attacks

  • Attacks

Advisory: The Instructure (Canvas) Breach and K-12 Supply Chain Security

Reading Time: 4 minsThe ongoing Instructure data ransom attack gives adversaries access to sensitive K-12 data. Discover how the breach…

1 week ago
  • Trends

Is Your Supply Chain Exposing Your Organization? 4 Security Case Studies

Reading Time: 7 minsNetwork perimeters are no longer static. They grow and shift with third parties, whose credential leaks are…

4 weeks ago
  • Attacks

Advisory Alert: C&M Software Supply Chain Attack Affects Brazilian Banks

Reading Time: 4 minsA supply chain cyberattack on C&M Software has impacted Brazilian financial institutions. Learn about the incident, its…

11 months ago
  • Attacks

Advisory Alert: Snowflake Supply Chain Attack

Reading Time: 3 minsExplore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures…

2 years ago
  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…

3 years ago
  • Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the…

3 years ago