The whitepaper discusses the importance of a third-party risk management (TPRM) program in mitigating security risks posed by third-party collaborations. It offers insights from cyber security experts on effectively implementing a TPRM, gaining stakeholder approval, and optimally using existing resources and tools.

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have revealed details about Outlaw, an “auto-propagating” cryptocurrency mining botnet that targets SSH servers with weak credentials. The Romanian-origin malware performs SSH brute-force