Cyber Security
In multiple hearings, lawmakers sought solutions to pressing technology-based security issues. Throughout a series of Hill hearings covering various defense topics—the future of budgets,...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
In multiple hearings, lawmakers sought solutions to pressing technology-based security issues. Throughout a series of Hill hearings covering various defense topics—the future of budgets,...
Christopher Wray told lawmakers tech companies are the ones making policies about encryption. FBI Director Christopher Wray warned lawmakers Tuesday that extremists like those...
Agencies showed some slight progress on IT issues, though cybersecurity took a step backward in the latest report. The Government Accountability Office released its biennial...
CBP One will become the primary public-facing portal for a number of customs programs and services. But any new data collection effort brings privacy...
Like many other sectors, the space industry needs to secure its supply chain from start to finish. Since President John F. Kennedy announced plans...
An unsecured server belonging to a data analytics company exposed an estimated 30TB of business records online, resulting in the firm being held to ransom. Polecat...
The Cybersecurity and Infrastructure Security Agency’s (CISA) second annual President’s Cup Cybersecurity Competition concluded last week, with the final rounds taking place over a three-day...
A recent cryptomining botnet campaign has been observed using Bitcoin blockchain transactions to hide its backup C2 IP addresses. It’s a very effective way...
Recently, Unit 42 researchers have come across the most sophisticated, well-engineered, and difficult-to-detect polymorphic malware. About the malware Dubbed BendyBear by experts, the malware...
In response to a Trump administration executive order, Joint Base San Antonio is getting ready to test its infrastructure against a simulated electromagnetic pulse...
Recent Comments