Cyber Security
A pair of vulnerabilities in the web control panel of IT monitoring system Icinga created a route for even unauthenticated attackers to run arbitrary PHP code...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
A pair of vulnerabilities in the web control panel of IT monitoring system Icinga created a route for even unauthenticated attackers to run arbitrary PHP code...
ANALYSIS Five years ago today (May 12), a ransomware attack blamed on a North Korean hacking group hit computers running Microsoft Windows, encrypting data and...
The REvil ransomware has a vulnerability that can be exploited to deactivate the malware before it encrypts files on an infected computer, a security...
A “balkanization” of tech – driven by various countries’ needs to be technologically independent from their strategic competitors and adversaries – is underway, delegates...
Russian video streaming service RuTube has denied the complete loss of its source code after a cyber-attack timed to coincide with Russia’s ‘Victory Day’ brought the...
The EU has blamed Russia for a powerful cyber-attack that disrupted satellite broadband services in Ukraine and “helped facilitate President Vladimir Putin’s invasion of...
ANALYSIS The European Union (EU) wants to see greater standardization across European cybersecurity legislation and regulations, according to the bloc’s cybersecurity agency. The EU sees...
The Biden administration has made a policy commitment to promote US leadership in the emerging technology of quantum computing. The National Security Memo on quantum...
A proof-of-concept (PoC) has been developed for a critical vulnerability in F5’s BIG-IP networking software which could expose thousands of users to remote takeover....
A credit card stealing service is growing in popularity, allowing any low-skilled threat actors an easy and automated way to get started in the...
Recent Comments