Cyber Security
The Defense Department’s needs are diverse and have become even more disparate amidst the post-SolarWinds landscape. The Pentagon’s abandonment of the Joint Enterprise Defense...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
The Defense Department’s needs are diverse and have become even more disparate amidst the post-SolarWinds landscape. The Pentagon’s abandonment of the Joint Enterprise Defense...
WordPress has extended its Site Health interface for developers, allowing for greater visibility over potential security flaws. Version 5.8 of WordPress core, out today (July...
A woman wearing a face mask to help curb the spread of the coronavirus walks by the Microsoft office building in Beijing, Tuesday, July...
Italian web hosting firm Aruba.it has admitted a recent data breach amid complaints from some customers that it was slow in notifying them about a problem....
Umbraco, a content management system (CMS) vendor, has given users of its form-building package a “heads-up” about an imminent software update addressing a remote code...
FILE – In this Jan. 28, 2020, file photo, a Microsoft computer is among items displayed at a Microsoft store in suburban Boston. The...
Leading Swiss price comparison platform Comparis has notified customers of a data breach following a ransomware attack that hit and took down its entire...
A new phishing campaign has been discovered delivering the BazarBackdoor malware. The campaign is using the multi-compression method to hide the malware as an...
Eyes now turn to the Office of Management and Budget to issue requirements for federal agencies and contractors based on NIST’s work. The National...
As Congress considers how to increase competition for app stores run by Apple, Google and others, it also needs to consider potential cybersecurity threats....
Recent Comments