All Related Articles for: 75% of Companies Ship Vulnerable Code On Purpose: Checkmarx
Found 13 articles related to this post based on shared entities and topics.
-
May 22, 2026Verizon DBIR: Vulnerability Exploits Surpass Credentials
Vulnerability exploitation has overtaken compromised credentials as the most…
Read More » -
May 13, 2026CheckMarx Jenkins package compromised by infostealer
Hacker group TeamPCP published a malicious version (2026.5.09) of…
Read More » -
May 7, 2026AI Security Risks in Proprietary Software, Hardware, and Protocols
Anthropic's Project Glasswing successfully used AI to find decades-old…
Read More » -
May 7, 2026Trellix Confirms Source Code Breach
Trellix, a major US cybersecurity firm formed from the…
Read More » -
April 26, 2026Firestarter malware evades Cisco firewall updates and patches
U.S. and U.K. cybersecurity authorities warn of the custom-built…
Read More » -
April 26, 2026Credential Management as a Financial Risk Control in DORA
DORA's Article 9 mandates that financial institutions implement least-privilege…
Read More » -
April 22, 2026Open-Source Tool Reveals CI/CD Pipeline Attack Methods
Boost Security has launched SmokedMeat, an open-source framework that…
Read More » -
April 9, 2026Storm-1175 Uses Medusa Attack Flaws
A financially motivated group, Storm-1175, has conducted relentless Medusa…
Read More » -
April 1, 2026TeamPCP Ransomware Shift Raises Threat Despite Slower Attacks
TeamPCP has not retreated but has strategically paused its…
Read More » -
March 27, 2026LiteLLM PyPI packages hijacked in TeamPCP supply chain attacks
A coordinated software supply chain attack by the group…
Read More » -
March 16, 2026Top Dark Web Monitoring Services & Bundles Reviewed
Data breaches are frequent and often undisclosed, with over…
Read More » -
March 4, 2026Cloudflare Blocks 230 Billion Daily Threats: Key Findings
Modern cyber threats are massive and automated, with over…
Read More » -
February 10, 2026Beyond AI: How Hackers Craft Targeted Password Wordlists
Attackers often bypass traditional password complexity by using public…
Read More »