Officials noted that identity action items could still be included in later iterations of the national cybersecurity strategy implementation plan. The White House’s implementation plan for the national...
The legislation proposes new requirements for disclosing cyberattacks, assigns guidance for A.I.-enabled cyber, codifies the Federal CISO role and more. A group of House and Senate...
Wireshark, an industry-leading network packet analyzer, has released version 4.0.7, which includes defect fixes, protocol updates, and a few enhancements. It continues to be an extensively...
A ‘critical’ severity flaw has been detected in FortiOS and FortiProxy, identified as CVE-2023-33308 (CVSS rating 9.8). A remote attacker can use the vulnerability on susceptible devices to execute Fortinet arbitrary...
The significant plunge in cyber crimes shows a decent rise in legitimate services in the mid of this year, 2023. However, the rise in ransomware attacks...
Recent reports from Team82 and Check Point Research (CPR) team state that there has been a major vulnerability in QuickBlox SDK (Software Development Kit) and API (Application...
A china based APT actor accessed Microsoft 365 cloud environment and exfiltrated unclassified Exchange Online Outlook data from a small number of accounts. In June 2023, a...
Russia’s invasion of Ukraine on February 24, 2022, followed escalating cyber operations, categorized into six phases, by Russian troops amassed at the border. Beyond the focus...
A coalition of industry stakeholders is urging the Biden administration to nominate a national cyber director by the end of the month in a new letter...
A China-based cybercriminal known as Storm-0558 gained access to unclassified U.S. government email accounts using forged authentication tokens according to a report released by Microsoft. The...