Cyber Security
A series of vulnerabilities in the web interface of Cisco Prime opened servers to remote code execution (RCE) attacks, two security researchers have found. Cisco Prime...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
A series of vulnerabilities in the web interface of Cisco Prime opened servers to remote code execution (RCE) attacks, two security researchers have found. Cisco Prime...
The Federal Bureau of Investigation (FBI) warned Americans this week that cybercriminals are using maliciously crafted Quick Response (QR) codes to steal their credentials and financial...
This week, the Cybersecurity and Infrastructure Security Agency (CISA) added seventeen actively exploited vulnerabilities to the ‘Known Exploited Vulnerabilities Catalog. The ‘Known Exploited Vulnerabilities...
The rise of editable Portable Document Files created a new avenue for attackers, but the right configuration can protect most systems without compromising functionality,...
A new phishing campaign using fake shipping delivery lures installs the STRRAT remote access trojan on unsuspecting victim’s devices. Fortinet discovered the new campaign...
The network guidance document is years in the making. The Cybersecurity and Infrastructure Security Agency on Thursday published guidance meant to provide federal agencies with security...
The European Commission (EC) has launched a bug bounty program for open source projects that underpin its public services. Bug bounty hunters will be offered up...
An emergency directive from the Transportation Security Administration following the Colonial Pipeline attack faced opposition from Senate Republicans after the industry complained they weren’t...
President Biden has granted the National Security Agency (NSA) new powers to bolster the cybersecurity of US federal government computer systems related to national...
Tighter controls have been introduced to resolve a weakness in GitHub Actions that made it possible to circumvent code review safeguards. Omer Gil and...
Recent Comments