Cyber Security
Concern is growing within the infosec community that a breach at DevOps platform vendor Travis CI might run deeper than the firm has so far been...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
Concern is growing within the infosec community that a breach at DevOps platform vendor Travis CI might run deeper than the firm has so far been...
A potentially troublesome set of web security vulnerabilities in Speer were promptly resolved after the researcher who unearthed the flaws notified its developer. Speer is...
A critical vulnerability in certain Matrix clients could allow an attacker access to encrypted messages. Users of the open source, decentralized communications platform are urged to...
Even rendered inoperable, equipment now in the hands of the Taliban will yield troves of information about how the U.S. builds weapons and uses...
An Ontario man has been sentenced to more than 11 years in jail for conspiring to launder millions of dollars, including the proceeds of...
The REvil ransomware gang has fully returned and is once again attacking new victims and publishing stolen files on a data leak site. Since...
Agencies must implement a comprehensive user monitoring program that effectively combines the human intelligence and artificial intelligence. Earlier this year, the Government Accountability Office...
WordPress has rolled out an update to its core codebase that includes mitigations against three security flaws As well as fixing 61 bugs, WordPress 5.8.1, released...
A newly discovered side-channel attack targeting Google Chrome can allow an attacker to overcome the web browser’s security defenses to retrieve sensitive information using a Spectre-style...
Security researchers have disclosed a HTTP request smuggling vulnerability in HAProxy, the popular open source load balancer. Users of HAProxy, which ships with most mainstream...
Recent Comments