What’s Going on With Cybersecurity VC Investments?

read more Continue reading What’s Going on With Cybersecurity VC Investments?

North Korean Gov Hackers Caught Rigging Legit Software

Threat hunters at Microsoft have intercepted a notorious North Korean government hacking group lacing legitimate open source software with custom malware capable of data theft, espionage, financial gain and network destruction.
read more Continue reading North Korean Gov Hackers Caught Rigging Legit Software

Investors Bet on Ox Security to Guard Software Supply Chains

The funding frenzy in the software supply chain space now includes Ox Security, an early-stage Israeli startup that just raised a whopping $34 million in seed-stage financing.
read more Continue reading Investors Bet on Ox Security to Guard Software Supply Chains

Senators Push to Reform Police’s Cellphone Tracking Tools

Civil rights lawyers and Democratic senators are pushing for legislation that would limit U.S. law enforcement agencies’ ability to buy cellphone tracking tools to follow people’s whereabouts, including back years in time, and sometimes without a searc… Continue reading Senators Push to Reform Police’s Cellphone Tracking Tools

CrowdStrike to Buy Reposify, Invests in Salt Security

Endpoint detection and response pioneer CrowdStrike is elbowing its way into new security markets with a planned acquisition of attack surface management startup Reposify and a strategic investment in API security vendor Salt Security.
read more Continue reading CrowdStrike to Buy Reposify, Invests in Salt Security

Uber Confirms Hacker Accessed Internal Tools, Bug Bounty Dashboard

Ride-hailing giant Uber is moving quickly to downplay the impact from a devastating security breach that included the theft of employee credentials, access to the HackerOne bug bounty dashboard and data from an internal invoicing tool.
read more Continue reading Uber Confirms Hacker Accessed Internal Tools, Bug Bounty Dashboard

US Agencies Publish Security Guidance on Implementing Open RAN Architecture

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have published guidance on implementing an Open Radio Access Network (RAN) architecture.
read more Continue reading US Agencies Publish Security Guidance on Implementing Open RAN Architecture