“Next-generation” 3rd Party Attacks

“Next-generation” 3rd Party Attacks

In July of 2020, we discussed seeding open-source projects with compromised components.  In the past six months, commercial and enterprise software developers became more disciplined in keeping developed open-source software libraries updated to reduce the risk of...
Charity Phishing

Charity Phishing

Cybercriminals love the holidays, through social media platforms like Facebook, phishing has turned to digital social networks and prior stolen information to prey on unsuspecting victims. Sparity has provided many presentations with the term “data aggregation”....
Explaining Cybersecurity to the C Level

Explaining Cybersecurity to the C Level

All the following aspects of your upstream communication will directly impact your departments, the boards confidence in you and your teams and most importantly the annual budget. As 2020 ends it will be more important than ever to have clearly defined objectives for...