Cyber Security
The four-year grant program, included in last year’s infrastructure law, will help states and local communities “strengthen their cyber resilience.” The Biden administration on...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
The four-year grant program, included in last year’s infrastructure law, will help states and local communities “strengthen their cyber resilience.” The Biden administration on...
The maintainers of venerable open source content management system (CMS) TYPO3 have fixed a cross-site scripting (XSS) flaw with a raft of software updates. The XSS...
Multiple vulnerabilities in the WAPPLES web application firewall (WAF) created a means to commandeer vulnerable devices and run arbitrary commands, a researcher warns. Another set of...
Certificate authority Let’s Encrypt has announced plans to establish a platform that will support the revocation of digital certificates via Certificate Revocation Lists (CRLs)....
The Office of the National Cyber Director has a workforce plan in development that looks to address public sector and private sector gaps in...
A vulnerability in Xalan-J, an Apache project used by multiple SAML implementations, could allow arbitrary code execution, researchers warn. XSLT (Extensible Stylesheet Language Transformations)...
An open source project designed to help security researchers fingerprint WordPress Plugins is seeking feedback and contributors. Currently in beta mode, WPHash is a free-to-use web...
A set of six high-severity firmware vulnerabilities impacting a broad range of HP devices used in enterprise environments are still waiting to be patched, although...
A growing number of ransomware groups are adopting a new tactic that helps them encrypt their victims’ systems faster while reducing the chances of being...
The new rules elaborate on what kinds of cyber activities warrant sanctions designation. The Treasury Department blocked U.S. persons and entities from engaging in...
Recent Comments