Cyber Security
The holiday shopping season is back with most online and brick-and-mortar stores trying to either offload inventory or level up the competition by offering...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
The holiday shopping season is back with most online and brick-and-mortar stores trying to either offload inventory or level up the competition by offering...
A report has been released detailing new variants of Android spyware associated with the APT C-23 group. The new variants boast improved stealth and persistence features...
Ukrainian police say they have put an end to the activities of an international phone-hacking collective after seizing incriminating evidence in a series of...
Microsoft is introducing a new feature in Edge allowing customers to pay for e-commerce transactions in instalments – and not everybody is happy. The ‘buy...
A new report by Constella Intelligence raises questions as to whether the sector is doing enough to protect itself. The rash of high-visibility ransomware...
Hide My WP, a popular WordPress security plugin, contained a serious SQL injection (SQLi) vulnerability and a security flaw that enabled unauthenticated attackers to deactivate the software. Now...
The FBI has a prominent portal for entities to report cybersecurity incidents, but Congress is considering legislation that officials fear could change the current...
A Government Accountability Office report on the Treasury Department’s role in shaping the market for cybersecurity insurance is expected next spring. The Government Accountability...
The tech can provide evidence of compliance with configuration standards and detect anomalies in complex multi-tenant, multi-cloud computing architectures. Cloud service providers and mobile...
Cyber policy lead Mieke Eoyang discussed the Defense Department’s role in the nation’s cybersecurity posture, including in defending elections and countering ransomware attacks. Those...
Recent Comments