Cyberbit, provider of Cyber Skills Development Platforms, revealed the results of the first annual Cyberbit SOC Skills Survey. In the fourth quarter of 2020, Cyberbit surveyed...
The Defense Department wants a vendor to manage the next phase of development for the insider threat program’s central database and case management. The Defense Department’s...
Multiple vulnerabilities in open source video platforms YouPHPTube and AVideo could be leveraged to achieve remote code execution (RCE) on a user’s device. Researchers from Synacktiv discovered multiple vulnerabilities in the source...
The domain registration belonging to Perl.com, the popular source of news and information about the Perl programming language, has reportedly been stolen. Brian Foy, a Perl...
The innovation group extended an other transaction agreement with cybersecurity firm CounterCraft with an eye to moving to a production contract in the coming months. The...
More than 23 million records were left exposed on a misconfigured server by free gaming platform VIPGames.com. Researchers from WizCase found the personal data of 66,000 users –...
Windows 7 is still susceptible to blind TCP/IP hijacking attacks via a vulnerability that a security researcher says he reported to Microsoft eight years ago. Adam Zabrocki (AKA ‘pi3’)...
Prospective contractors will get credit toward the requirement for approvals by three existing public and private auditing programs. The Defense Department and the pending nonprofit organization...
Whoever is behind the site is using the Federal Trade Commission’s logo and address. The Federal Trade Commission issued a unique consumer alert this week, warning...
Firefox 85 has cracked down on so-called ‘supercookies’ by introducing cache partitioning that blocks cross-site tracking. Like ordinary cookies, supercookies are small pieces of data stored on a...