Cyber Security
A SQL injection (SQLi) vulnerability in an open source platform developed by Greek universities to manage student data left academic grades at risk of manipulation. Miscreants...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
A SQL injection (SQLi) vulnerability in an open source platform developed by Greek universities to manage student data left academic grades at risk of manipulation. Miscreants...
But, in general, the industry wants NIST to avoid making any changes at all to the choose-your-own-adventure document that has guided risk management and...
Intigriti has today announced a new program that will combine bug bounty hunting with penetration testing models to offer hackers payment by the hour...
IBM has updated data management platform Db2 in order to protect users from a pair of critical vulnerabilities in older versions of Expat, a...
A new industry group aims to coordinate efforts improve industrial control system security in an effort geared towards bolstering the resilience of critical infrastructure components. The...
New legislation advocates safeguarding U.S. online networks with quantum-resistant encryption as a preemptive cybersecurity measure. Even the top countries pursuing quantum technology are several...
A studious adversary may be hellbent on destruction, and a comprehensive approach is needed to successfully govern the protection of critical infrastructure, specialists say....
The second edition of Pwn2Own Miami has thrown up dozens of previously undiscovered exploits to industrial control systems, earning security researchers pay-outs of $400,000 in...
Patches meant to protect containers Amazon Web Services (AWS) containers against the dangerous Log4Shell bug had critical vulnerabilities that could allow malicious containers to...
An overnight hackathon held by bug bounty platform YesWeHack saw researchers battle to earn a maximum of €10,000 (US $10,890). The event, dubbed ‘Hack...
Recent Comments