How Companies Can Protect Themselves from Password Spraying Attacks
Attackers are using many types of attacks to compromise business-critical data. These can include zero-day attacks, supply chain attacks, and others. However, one of the most common ways that hackers…
2021 Mid-Year WordPress Security Report: A Collaboration Between Wordfence and WPScan
Wordfence has collaborated with WPScan to conduct a 2021 mid-year review on the state of WordPress security. Using attack data from Wordfence’s internal threat intelligence platform, and vulnerability data from…
Hackers Steal Over $600 Million Worth of Cryptocurrencies from Poly Network
Hackers have siphoned $611 million worth of cryptocurrencies from a blockchain-based financial network in what’s believed to be one of the largest heists targeting the digital asset industry, putting it…
AllStar: Continuous Security Policy Enforcement for GitHub Projects
Posted by Mike Maraya, Google Open Source Security Team As an active member of the open source software (OSS) community, Google recognizes the growing threat of software supply chain attacks…

