Cyber Security
A vulnerability in collaboration software is undergoing “mass exploitation,” according to U.S. Cyber Command. The Cybersecurity and Infrastructure Security Agency is imploring administrators to...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
A vulnerability in collaboration software is undergoing “mass exploitation,” according to U.S. Cyber Command. The Cybersecurity and Infrastructure Security Agency is imploring administrators to...
A critical vulnerability in a Cisco product designed to help service providers and enterprises deploy virtualized networks can allow unauthenticated actors to bypass authentication. The security...
Leader of a Pentagon-wide DevSecOps initiative, Nicolas Chaillan cited lack of support from senior leadership as one reason for his departure. Nicolas Chaillan—the Air...
The US Federal Trade Commission (FTC) has banned a spyware developer and its CEO from operating in the surveillance market in a landmark decision hailed by...
During congressional testimony, cybersecurity firm FireEye pushed for greater liability protections to be included in a draft cyber incident reporting bill. Rep. John Katko,...
Cybersecurity accreditation provider CREST has branded NCC Group “vicariously responsible” participants in a cheating scandal first reported last summer. In August 2020, CREST was...
The US Securities and Exchange Commission (SEC) has sanctioned multiple financial services firms for cybersecurity failures that led to the compromise of corporate email accounts and...
Microsoft has patched a fresh security vulnerability in Exchange Server that enables attackers to bypass authentication and snoop on employee emails. The high severity flaw...
The team behind TensorFlow, Google’s popular open source Python machine learning library, has revoked support for YAML due to an arbitrary code execution vulnerability. YAML is...
A security vulnerability in popular dating app Bumble could have enabled attackers to pinpoint other users’ precise location. Using fake Bumble profiles, security researcher...
Recent Comments