Cyber Security
Advanced persistent threat actors are becoming harder to spot and making attribution more difficult. Advanced persistent threat actors are making it more difficult to...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
Advanced persistent threat actors are becoming harder to spot and making attribution more difficult. Advanced persistent threat actors are making it more difficult to...
The inspector general attributed the delays in the agency’s data at rest encryption program to additional mandates and poor adherence to program management best...
The federal CIO offered a few details of the project proposals received and upcoming award announcements. The Technology Modernization Fund Board has picked seven...
An investigation at US truck maker Navistar has revealed that a data breach on its systems exposed employee healthcare information. Navistar hired external cybersecurity experts and...
The Electronic Frontier Foundation (EFF) is planning to retire the HTTPS Everywhere browser extension because, 10 years on from the release of the plugin, its security...
Fraudsters are using Twitter bots to trick unsuspecting tweeters into making PayPal and Venmo payments to accounts under their control. The bots appear to be...
OWASP celebrated its 20th anniversary last week with a 24-hour webinar that saw the organization officially launch the top 10 web security vulnerabilities for...
Attackers are actively exploiting a critical vulnerability in VMware vCenter Server that exposes vulnerable enterprise networks to the risk of infiltration. The arbitrary file upload flaw...
Microsoft announced that Basic Authentication will be turned off for all protocols in all tenants starting October 1st, 2022, to protect millions of Exchange...
Security researchers have found a flaw in the Microsoft Windows Platform Binary Table (WPBT) that could be exploited in easy attacks to install rootkits...
Recent Comments