Cyber Security
The government’s site for managing government websites—dotgov.gov— may temporarily go down for maintenance as officials make the switch. The General Services Administration is preparing...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
The government’s site for managing government websites—dotgov.gov— may temporarily go down for maintenance as officials make the switch. The General Services Administration is preparing...
Experimentation with ANSI escape characters on terminal emulators has led to the discovery of multiple high-severity DoS (denial of service) vulnerabilities on Windows terminals...
Mailboxes are increasingly becoming the scene of a crime. While cybercrime gets a lot of attention from law enforcement and the media these days, I’ve been...
A vulnerability with the same root cause as the notorious Log4j flaw has been patched in the console of the hugely popular Java SQL database, H2...
Look for trainers working on the Cybersecurity Maturity Model Certification program to realign their efforts to support recent changes to the certification process in...
Java RMI services can be attacked through server-side request forgery (SSRF) attacks, according to a detailed analysis of the problem by security researcher Tobias Neitzel. Java...
There are real security concerns that should be addressed ahead of further government adoption of a truly automated future. Much as a character in...
Web skimming attacks are targeting hundreds of real estate websites via a cloud-based video hosting service, researchers have warned. A blog post from Unit 42, the...
Forty-two advisers have been appointed or are in the process, with eight states still needing federal-level coordinators. The Cybersecurity and Infrastructure Security Agency is...
Legislation recently clearing a key Senate committee stops short of requiring the Government Accountability Office to review vendors’ encryption practices and supply chains. The...
Recent Comments