Cyber Security
The developers of the Drupal content management system (CMS) released out-of-band security updates right before Thanksgiving due to the availability of exploits. The core...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
The developers of the Drupal content management system (CMS) released out-of-band security updates right before Thanksgiving due to the availability of exploits. The core...
Users of the popular Drupal content management system (CMS) ought to patch their installations to defend against recently resolved, critical vulnerabilities. Various versions of the widely...
A remote code execution (RCE) vulnerability that could expose a users’ cloud assets has been patched in the open source, Elixir-based Paginator project. Discovered by security...
A security researcher says he has been banned from online multiplayer game Call of Duty: Modern Warfare after reverse engineering its networking code in...
Meet Ian Thornton-Trump. He is the Chief Information Security Officer at Cyjax, and an ITIL certified IT professional with 25 years of experience in...
The chair and ranking member of the House Energy and Commerce Committee are assuring the head of the Federal Communications Commission that between $1-2...
Sumo Logic released findings from its fifth annual report. ”The Continuous Intelligence Report: The State of Modern Applications, DevSecOps and the Impact of COVID-19” provides...
Few cybersecurity components are as familiar as the next-generation firewall (NGFW) for enterprise protection. Despite this ubiquity, it is common for security teams to operate their...
Recent Comments