Software supply chain attacks surged at the end of 2025, with 41 attacks uncovered in October alone. And there was an unmistakable pattern. Attackers stopped trying to breach organizations directly and instead focused on opportunities for widespread impact. Why pick...
In aerospace and defense, the line between safety and cybersecurity has disappeared. As aircraft and defense systems become increasingly software-defined and network-connected, the same architectures that deliver speed, agility, and capability also introduce new...
Memory safety vulnerabilities are one of the most prevalent weaknesses in software, and the number of Known Exploited Vulnerabilities (KEVs) across industries are steadily increasing. In a webinar hosted by Dark Reading, RunSafe Security CTO Shane Fry and VulnCheck...
Memory safety vulnerabilities remain one of the most persistent and exploitable software weaknesses. Memory corruption flaws, when exploited, allow attackers to execute arbitrary code, escalate privileges, bypass security controls, or crash or take over critical...
Recently, nation-state actors, like the Volt Typhoon campaign, have demonstrated the potential real-world impact of memory safety vulnerabilities in the software used to run critical infrastructure. It’s for this reason, among other national security, economic, and...