Executive Summary While ransomware and ransomware-as-a-service (RaaS) attacks have dominated much of the cybersecurity community’s discussions over the past several months, criminals and hackers continue to...
The long-awaited change to the background investigations process will flag concerning information for further investigation. All Defense Department clearance holders are now officially part of a...
Agencies cannot stop hackers from targeting them. But we can—and should—develop risk management strategies. While serving as the chief information security officer for the U.S. Postal...
Today, U.S. President Joe Biden said that the U.S. will bring together 30 countries to jointly crack down on ransomware gangs behind a barrage of attacks...
The Federal Communications Commission (FCC) announced earlier this week that phone companies are now required to filter calls from providers who haven’t complied with a deadline...
In a major blunder, cryptocurrency platform Compound accidentally paid out $90 million among its users. Shortly after the mistake, the platform’s founder began asking users to...
The banking and investing platform MoneyLion had to lock customer accounts that were breached in credential stuffing attacks over the summer, in June and July. The...
Arctic Wolf, a managed cybersecurity company that offers a “security operations-as-a-concierge” service, has acquired Habitu8, a security training and awareness content platform. Terms of the deal...
In June 2012, Deloitte conducted an online survey of 50 C-suite and other executives about cyber threat detection and response and found that almost 87% of...
14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties CyberNews security researchers found that 14 top Android apps,...