Identity management has become a focal point for enterprise security. With the 2020 COVID-19 pandemic and the scramble to support work-from-home employees, the real threat to...
Investigations remain ongoing, Cybersecurity and Infrastructure Security Agency leaders said at a hearing on modernizing the federal government’s approach to cybersecurity. Vulnerabilities that spurred an emergency...
Reps. Elissa Slotkin, D-Mich., and Mike Gallagher, R-Wisc., are leading the three-month task force. A new task force will look for legislative tools that could be...
The Homeland and Cyber Threat Act would amend the Foreign Sovereign Immunities Act to give Americans legal recourse for damages caused by foreign hackers. A bipartisan...
The developers of the Kentico CMS have patched a critical vulnerability that could be exploited to compromise backend databases. The vulnerability was disclosed by Obrela Labs penetration tester...
A platform for sharing and requesting indicators of compromise (IoCs) associated with different malware strains is the latest open source intelligence (OSINT) service launched by Abuse.ch....
The security and privacy of Apple’s Bluetooth location-tracking system has earned praise from researchers who uncovered two implementation flaws in the technology. Apple’s OF (Offline Finding)...
Bloomberg has reported that a group of hackers have breached a database containing security camera feeds collected by Verkada Inc., a Silicon Valley startup. The database includes live...
Researchers from the Counter Threat Unit (CTU) at Secureworks have discovered a possible link to China while examining how SolarWinds servers were used to deploy malware. In late 2020, Secureworks CTU researchers observed...
Hybrid work is emerging as a norm, especially for companies who have a mix of workers whose job requires coming into the office, and those who...