The Cybersecurity and Infrastructure Security Agency should be involved every step of the way, a former presidential adviser said. U.S. law enforcement officials are investigating a...
The latest investigation updates from SolarWinds and Microsoft offer differing views on how nation-state threat actors compromised SolarWinds’ environment. The investigations into the initial attack vector...
The NextGen Gallery development team has addressed two severe CSRF vulnerabilities to protect sites from potential takeover attacks. NextGen Gallery, a WordPress plugin used for creating...
TeamTNT has been taking huge strides to reach the top of the ladder and its latest target is Kubernetes clusters. The gang is using a never-before-seen...
It would be safe to say that social media has become an integral part of most of our lives. Be it to make friends, find jobs,...
Extension will allow the Task Force to continue its work as outlined in its recently released Year 2 Report and position itself to support the supply...
Tinder becomes first dating app to be recognized for comprehensive information security practices in accordance with internationally accepted standards Tinder, the world’s most popular app for...
Researchers at Armorblox uncovered invoice-themed emails sent to at least 20,000 mailboxes that purport to share information about an electronic funds transfer (EFT) payment. The Armorblox...
There’s a good reason everyone’s talking about MITRE ATT&CK: it’s an objective, third-party standard with which organizations can measure their own detection coverage, as well as the coverage...
Authorities said they detected the attack a few hours after it started and blocked it on Saturday. A mysterious group of hacktivists has poisoned the DNS...