ON THE FRIDAY heading into Memorial Day weekend this year, it was meat processing giant JBS. On the Friday before the Fourth of July, it was IT management software...
Another Accellion breach victim has been named nine months after threat actors exploited zero-day vulnerabilities in the company’s File Transfer Application. Beaumont Health has notified approximately 1500 patient that...
Autodesk, a California-based design software and 3D technology firm, is now acknowledging that it was one of several tech and security companies targeted by a Russian-linked...
CISA said a remote attacker could exploit the vulnerability to take control of an affected system. CISA released a note this week urging IT teams to update a...
Allan Friedman, the leader of a transparency initiative at the Commerce Department, is now at the Cybersecurity and Infrastructure Security Agency to realize the ultimate vision...
A vulnerability in collaboration software is undergoing “mass exploitation,” according to U.S. Cyber Command. The Cybersecurity and Infrastructure Security Agency is imploring administrators to apply recent...
The Technology Modernization Fund would get another $1 billion. The House Committee on Oversight and Reform adopted an amendment offered by Rep. Gerry Connolly, D-Va., that earmarks more...
Policymakers have been working on implementing continuous monitoring of its human assets with access to top secret information for several years, and the government should do...
Many push-button phones on sale in Russia contain backdoors or trojans, a security researcher claims. According to Russian researcher ‘ValdikSS’, some cellphones are automatically sending SMS messages or transmitting online...
Over the past two weeks, it has been busy with ransomware news ranging from a gang shutting down and releasing a master decryption key to threat...