Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
| 19 Mar 2026 | |
| Written by Gabi Gerber | |
| Attacks & Threats |
| Security Operation Center, Hacking Topics |
Cybersecurity companies are not immune from the same kind of attacks they help their customers defend against — but a successful compromise could have big consequences for their customers in ways that other hacks don't.
A recent example of attackers targeting security vendors is a phishing attack aimed at a C-level executive at security firm Outpost24 that was engineered to bypass multiple layers of enterprise email security without triggering a single alert.
Read more here
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly… More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizati… More...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...
ImmuniWeb is hosting an interactive webinar “Web, Mobile & Cloud Penetration Testing in 2026: Best Practices” for all ou… More...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly… More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...
RSAC 2026 CONFERENCE — San Francisco — When people talk about transparency in cybersecurity, they are usually referring … More...