The Government Accountability Office found that the Pentagon “lacks an accountable organization and consistent guidance” for documenting and sharing details about reported cyber incidents. Although the...
The agency also suggested existing sectors be consolidated and that there is a need for some agencies to exercise greater authority over private-sector entities. Leading cybersecurity...
Actors linked with the Iranian government were able to exploit an unpatched Log4Shell vulnerability—which the Cybersecurity and Infrastructure Security Agency asked agencies to address by the...
Major industry groups clashed on how CISA should define key terms in its rulemaking process to implement the federal incident reporting law. Providers of commercial information...
Security vendor F5 has prepared hotfixes for a pair of vulnerabilities affecting its BIG-IP and BIG-IQ networking devices that could result in remote code execution (RCE). Software updates...
Malicious actors can stage cross-site scripting (XSS) attacks across the subdomains of a website if they can trick users of Chromium browsers into entering a simple...
HackerOne has revamped its policy guidelines to offer better protection from legal problems for ethical hackers acting in good faith. The Gold Standard Safe Harbor (GSSH)...
A research from Tessian, the State of Email Security Report, found that enterprise email is now the No. 1 threat vector for cyberattacks. According to the report, 94%...
The holidays are just around the corner, and the competition for consumer attention and dollars promises to be fierce. According to Akamai research, up to 20% of potential...
Recent scientific research into the psychological effects of a ransomware crisis on both organizations and individuals revealed the deep marks that a ransomware crisis leaves on all those...