Threat actors have discovered a new technique to insert malicious code into websites. They are currently utilizing Eval PHP, an abandoned WordPress plugin. Mostly, website backdoors...
Google Cloud is making it’s Assured Open Source Software (Assured OSS) service available for Java and Python ecosystems without charge in response to the rising dangers...
The benefit exchange’s director testified before a House Committee on the ongoing investigation into a data breach exposing DC residents’ and lawmakers’ data. Leadership from the...
The Logging Made Easy tool will move to CISA’s GitHub page later this year but will be unsupported in the meantime. The United Kingdom’s cybersecurity agency...
The management of the government’s IT acquisitions and operations is also on the Government Accountability Office’s biennial high risk list update this year, as it has...
London-based professional outsourcing giant Capita has published an update on the cyber-incident that impacted it at the start of the month, now admitting that hackers exfiltrated...
A new Lazarus campaign considered part of “Operation DreamJob” has been discovered targeting Linux users with malware for the first time. This new targeting was discovered...
VMware addressed a critical vRealize Log Insight security vulnerability that allows remote attackers to gain remote execution on vulnerable appliances. Now known as VMware Aria Operations for...
The Department of Health and Human Services issued three new online resources for health care entities to fortify their digital networks. The Department of Health and...
Prosecutors unveiled charges Monday against a “troll farm” and Chinese nationals who worked with a Zoom employee to crash meetings with U.S.-based dissidents. A “secret police...