The recent ransomware attack on Blue Yonder, a supply chain management SaaS provider, had a profound impact on its managed services hosted environment, affecting many of the company's 3,000 customers spread across 76 countries. The attack, which was publicly disclosed on November 21, has
In the ever-evolving landscape of cybersecurity, managing false positives in threat intelligence remains a persistent and formidable challenge for security teams. Security teams often find themselves inundated with alerts, many of which turn out to be false alarms, resulting in decreased efficiency
Phishers have now devised an innovative and troubling method to bypass email security, utilizing corrupted Microsoft Office files that exploit the predictable behaviors of software recovery processes. This new tactic targets users with enticing messages about payments, benefits, or year-end bonuses
Veracode is pioneering advancements in secure software development, aiming to assist developers in crafting secure-by-design software and enabling security teams to mitigate risks throughout their code-to-cloud ecosystem. This analysis will delve into the latest enhancements Veracode has
A Chinese government-linked group known as "BrazenBamboo" has recently come under scrutiny for exploiting a zero-day vulnerability in Fortinet's Windows VPN client. The vulnerability, which was discovered and reported by Volexity in mid-July, has remained unpatched, allowing
In an era where digital landscapes continuously evolve, cybersecurity threats are becoming increasingly sophisticated and ubiquitous. Traditional security measures are often no longer adequate to protect sensitive data and infrastructure. This has led many industry experts to question whether