Cyber Security
Agencies would see new reporting requirements to keep Congress and impacted individuals more informed about security breaches. Two senior senators introduced legislation late last...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
Agencies would see new reporting requirements to keep Congress and impacted individuals more informed about security breaches. Two senior senators introduced legislation late last...
UPDATED An Australian travel agency has been criticized, but not fined, after regulators decided it was to blame for exposing user data during a coding event. The breach –...
A critical flaw in software used throughout government was reportedly used to breach a major security company and at least two federal agencies. The...
FILE – The U.S. Treasury Department building viewed from the Washington Monument, Wednesday, Sept. 18, 2019, in Washington. Hackers got into computers at the...
Hackers working on behalf a foreign government are believed to be behind a highly sophisticated attack into a range of key government networks, including in the...
After a successful launch earlier this year, Carnegie Mellon researchers introduced the latest version of the IoT Privacy Assistant, an app and digital infrastructure that enables users to...
FILE – The U.S. Treasury Department building viewed from the Washington Monument, Wednesday, Sept. 18, 2019, in Washington. Hackers got into computers at the...
Security researchers on Thursday documented and described a new injection technique capable of extracting sensitive data from PDF files. “One simple link can compromise...
Retailers are on high alert during holiday season of Magecart attacks, which implant malicious computer code into websites and third-party suppliers of digital systems...
Current federal efforts to help mitigate threats against privately operated critical infrastructure fall short, according to a National Infrastructure Advisory Council report. Federal agencies...
Recent Comments