Cyber Security
Cybersecurity firm Emsisoft has been secretly decrypting BlackMatter ransomware victims since this summer, saving victims millions of dollars. Emsisoft and its CTO Fabian Wosar have been...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
Cybersecurity firm Emsisoft has been secretly decrypting BlackMatter ransomware victims since this summer, saving victims millions of dollars. Emsisoft and its CTO Fabian Wosar have been...
The Federal Trade Commission (FTC) found that the six largest internet service providers (ISPs) in the U.S. collect and share customers’ personal data without...
There’s much to be considered as ‘what could be one of the most disruptive periods in human history’ approaches. In producing and carrying out...
Companion legislation awaits a vote in the Senate. The House Wednesday passed legislation geared toward preventing equipment and technology from certain Chinese Community Party-backed...
Deputy Attorney General Lisa Monaco also promised to compensate whistleblowers who reveal federal contractors misrepresenting their cybersecurity posture. Companies could shield themselves from legal...
A new interim rule takes aim at Russia and China. U.S. companies will need to obtain a license from the Commerce Department to sell...
Cyber leaders’ plan to emphasize collective defense over offense hinges on industry’s willingness to share information with government in real time. Establishing a working...
A joint advisory officially associates the notorious ransomware-as-a-service group with the Colonial Pipeline attack. Federal agencies credited a trusted third-party in issuing specific detection...
The agency has an idea of what it wants from the capability but is soliciting industry input on key aspects of an enduring investment...
The multiple bugs and coding errors in malware offer defenders a means to create better defenses. This is according to a team presenting at the Virus...
Recent Comments