The Federal Communications Commission’s proposed rule would require telecommunications providers to immediately notify consumers and federal agencies about any breaches involving “customer proprietary network information.” The...
An OIG investigation found that the Interior Department has not fully implemented multifactor authentication and that its “outdated and ineffective” password requirements leave employees’ accounts vulnerable...
The Energy Department’s Clean Energy Cybersecurity Accelerator matches innovators in critical infrastructure cybersecurity with industry experts and a high-tech testbed. The Energy Department is searching for...
The agency is issuing an update to the General Records Schedule, including new rules for packet capture and cybersecurity incident logs. The National Archives and Records...
Security researchers have defended academics who discovered several serious security flaws in Threema following criticism of their work by developers of the encrypted messaging app. A...
Prototype pollution is a dangerous bug class associated with prototype-based languages, the most popular among them JavaScript. One researcher, however, has found a variant of prototype pollution...
Regardless of what 2023 holds in store for the economy, your organization’s financial commitment to supporting OT cybersecurity efforts is being decided now. In the public...
In this Help Net Security video, Jason Kent, Director at Open Seas, explains why FIDO and passwordless authentication is the future. He dives deep into the technical...
You may already have an IR plan but regardless of how thorough you might feel it is at this moment, the evolving cyber threat landscape and shifting circumstances...
The MS Exchange exploit chain recently revealed by Crowdstrike researchers is how the Play ransomware gang breached the Rackspace Hosted Exchange email environment, the company confirmed last week....