ModSecurity 3 web application firewall (WAF) installations configured to disable Request Body Access can be bypassed, security researchers warn. The purported issue in ModSecurity rule sets is...
Vulnerabilities in the Smarty PHP template engine could be exploited to achieve remote code execution (RCE) in third-party applications, a security researcher has warned. Two separate sandbox...
Cybercriminals are constantly exploring and documenting new ways to go around the 3D Secure (3DS) protocol used for authorizing online card transactions. Discussions on underground forums...
Leading payroll company PrismHR is suffering a massive outage after suffering a cyberattack this weekend that looks like a ransomware attack from conversations with customers. PrismHR...
Cybersecurity firm Qualys is likely the latest victim to have suffered a data breach after a zero-day vulnerability in their Accellion FTA server was exploited to steal...
Government imposter scams now come with a new twist that has the potential to make them even more effective, as the Inspector General for the Social...
All agencies must report their status to CISA by noon on March 5. Federal agencies must track and capture data related to all on-premises Microsoft Exchange...
Three department IT leaders share their top asks from the new Congress and yet-to-be-appointed federal CIO. Agency chief information officers want the new Congress and incoming...
In multiple hearings, lawmakers sought solutions to pressing technology-based security issues. Throughout a series of Hill hearings covering various defense topics—the future of budgets, security threats...
The Homeland Security Department warns it never solicits money over the phone. Fraudsters impersonating U.S. Border Patrol agents and other federal officials are trying to steal...