AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach Jordyn Alger April 3, 2026 Mercor has faced a breach of data. Read More
The New Era of Supply Chain Attacks: When One Falls, All Fall Chad LeMaire October 27, 2025 Third-party ecosystems are now one of the most profitable attack avenues as when one supplier is compromised, the effects can quickly ripple through entire industries. Read More
2B Weekly Downloads at Risk: Supply Chain Attack Targets Popular npm Packages, Security Leaders Discuss Jordyn Alger September 10, 2025 18 popular packages with a total of 2 billion weekly downloads were targeted in an attack. Read More
New Research: Multi-Stage Malware Attack on Python Package Index Discovered Jordyn Alger June 18, 2025 Researchers have discovered that the Python Package Index (PyPI) has a malicious package in its repository. Read More
Navigating the regulatory and compliance landscape of 2025 Steve Brining November 14, 2024 As security leaders look ahead to 2025, the regulatory and compliance landscape is set to undergo a significant transformation.Read More
Supply chain cybersecurity and modern-day cargo theft Mike Ehrich August 15, 2024 As cargo theft becomes increasingly sophisticated, companies must adapt. Read More
99% of Global 2000 organizations are linked to a supply chain breach Security Staff August 5, 2024 99% of Global 2000 organizations have been directly linked to a supply chain breach. Read More
5 Minutes With Automating a more resilient supply chain Jordyn Alger April 24, 2024 As technology evolves, manufacturers can leverage new tools to reduce costs while improving accuracy, visibility and customer satisfaction.Read More
Are AI data poisoning attacks the new software supply chain attack? Sitaram Iyer April 18, 2024 With rapid AI adoption happening across varying business units, maintaining the integrity of those systems is a growing concern.Read More
Adapting to the latest SEC disclosures Deepika Gajaria April 5, 2024 Threats such as cyberattacks, supply chain attacks, network intrusions, and ransomware are now an everyday occurrence, causing significant damage. Read More