Cyber Security
The Aberebot Android banking trojan has returned under the name ‘Escobar’ with new features, including stealing Google Authenticator multi-factor authentication codes. The new features...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
The Aberebot Android banking trojan has returned under the name ‘Escobar’ with new features, including stealing Google Authenticator multi-factor authentication codes. The new features...
After almost a decade and a series of massive intrusion campaigns, government and industry may finally be ready to have the crucial talk about...
Russian authorities claim they quickly thwarted a cyber-attack that sought to compromise government websites via a hacked statistics widget. The software, developed by the Russian...
Cyber activity is focused heavily on eastern Europe. Russia’s invasion of Ukraine is not just capturing the world’s attention—it’s drawing a massive amount of...
The FBI says it has identified at least 52 critical infrastructure entities infected by RagnarLocker ransomware since it arrived on the cybercrime scene nearly two years...
The legislation advances in the House after clearing the Senate in March, and would offer new cybersecurity training to federal and state governments. The...
The Office of Management and Budget pressed federal agencies on a deadline to adopt the software supply chain best practices as directed under last...
Processes spurring from the Ragnar Locker Ransomware have affected at least 52 critical infrastructure victims since January, but will terminate if it encounters systems...
A security vulnerability in e-learning platform Moodle could allow an attacker to take over a database and potentially obtain sensitive information, researchers have warned....
The federal chief information security officer is moving ahead with congressional priorities for the .gov enterprise, as lawmakers fail to pass bipartisan incident reporting...
Recent Comments