Cyber Security
John Sherman, longtime U.S. intelligence official and former Acting Chief Information Officer (CIO) of the Department of Defense (DoD), has been appointed as the...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
John Sherman, longtime U.S. intelligence official and former Acting Chief Information Officer (CIO) of the Department of Defense (DoD), has been appointed as the...
Two in three U.S. organizations believe the distraction caused by the pandemic poses a “significant risk” to operational technology (OT) environments, according to a...
Users of QNAP network-attached storage (NAS) devices are reporting attacks on their systems with the eCh0raix ransomware, also known as QNAPCrypt. The threat actor...
Photography and personalized photo giant Shutterfly has suffered a Conti ransomware attack that allegedly encrypted thousands of devices and stole corporate data. Although many...
Officials must weigh the benefits and risks on a case-by-case basis. For decades, cyberattacks, counterterrorism events and acts of espionage happened in secret—and stayed there....
The cryptographic protocol is at the heart of a ‘zero trust’ proposal pioneered by Google that has a fan base within the federal government....
A subdomain takeover vulnerability in a popular WordPress hosting platform could allow an attacker to deploy malicious code to a victim by impersonating a...
Vulnerabilities in wireless chip designs could allow malicious hackers to steal data and passwords from devices, according to security researchers. According to the group, from the...
More than half a million patients have been impacted by a data breach at US healthcare provider Texas Ear, Nose and Throat Specialists (Texas ENT). After...
A 19-year-old hacker from Nepal has received a $4,500 bug bounty following their discovery of an easy-to-exploit vulnerability that allowed users to reveal the...
Recent Comments