The White House announced new plans to promote quantum technology research and development while helping U.S. computer networks transition to post-quantum cryptography standards. The Biden administration...
While the government is focused on the dangers of ransomware, phishing campaigns can circumvent the usual protections placed on its networks. Over the past couple years,...
A zero-day vulnerability in uClibc and uClibc-ng, a popular C standard library, could enable a malicious actor to launch DNS poisoning attacks on vulnerable IoT devices. The bug,...
The State Bar of Georgia in the US has suspended the normal operation of its website following “unauthorized access to its network”. The authorized access by as-yet...
Google said today that a Chinese-sponsored hacking group linked to China’s People’s Liberation Army Strategic Support Force (PLA SSF) is targeting Russian government agencies. The company’s...
A vulnerability in the domain name system (DNS) component of a popular C standard library that is present in a wide range of IoT products may put millions of...
Security researchers have discovered five vulnerabilities in network equipment from Aruba (owned by HP) and Avaya (owned by ExtremeNetworks), that could allow malicious actors to execute...
Researchers have identified a new cluster of malicious cyber activity tracked as Moshen Dragon, targeting telecommunication service providers in Central Asia. While this new threat group...
Microsoft says that its enterprise-grade endpoint security for small to medium-sized businesses is now generally available as a standalone solution. Known as Microsoft Defender for Business, this product is designed...
Phishing actors abuse Google’s SMTP relay service to bypass email security products and successfully deliver malicious emails to targeted users. According to a report from email...