Cyber Security
A new credential stealer has been identified that is written in AutoHotkey (AHK) scripting language. In an ongoing attack campaign that started in early...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
A new credential stealer has been identified that is written in AutoHotkey (AHK) scripting language. In an ongoing attack campaign that started in early...
A new malware strain has been discovered that uses Word files with macros to download a PowerShell script hosted on GitHub. Further, the script downloads...
(CNN Business)Microsoft said Thursday that the suspected Russian hackers behind a massive US government security breach also viewed some of the company’s source code.The...
T-Mobile has announced a data breach exposing customers’ proprietary network information (CPNI), including phone numbers and call records. Starting yesterday, T-Mobile began texting customers...
A network of companies and an individual linked to them have been barred from continuing with an alleged tech fraud scheme said to have...
When the World Health Organization declared COVID-19 a pandemic, organizations across the globe had to adapt and change the way they operate, fast. As...
About this time of year, all kinds of companies in a variety of sectors engage in the crystal-ball gazing tradition of making predictions for...
An agency can run a completely compliant network and still be breached by a trusted user’s account being exposed. The U.S. government is one...
Nextgov looks back at the Trump administration’s major IT policy moves that will have lasting effects on federal technology for the foreseeable future. Technology...
The delayed third edition of the US Department of Defense’s ‘Hack the Army’ bug bounty program is due to take place next month. Hack the Army...
Recent Comments