In a contentious nomination hearing, Colin Kahl called for a whole-of-government approach to technology. In between heated questions from Republican senators about tweets and arguments over...
The National Security Agency and Cybersecurity and Infrastructure Security Agency (CISA) released a cybersecurity information sheet, “Selecting a Protective DNS Service.” This publication details the benefits...
“Identity is everything now,” a technical strategist told NIST advisers in a briefing on the hacking campaign. The way the adversary behind the SolarWinds hack used legitimate credentials...
Technologists look for environments that value them, give them challenging opportunities, help them grow their skills, and provide a path to advance their careers. Already, the...
Women in information security face ongoing sexism and discrimination, and more than half believe it will be 10 years or more before they are treated equally...
ModSecurity 3 web application firewall (WAF) installations configured to disable Request Body Access can be bypassed, security researchers warn. The purported issue in ModSecurity rule sets is...
Vulnerabilities in the Smarty PHP template engine could be exploited to achieve remote code execution (RCE) in third-party applications, a security researcher has warned. Two separate sandbox...
Cybercriminals are constantly exploring and documenting new ways to go around the 3D Secure (3DS) protocol used for authorizing online card transactions. Discussions on underground forums...
Leading payroll company PrismHR is suffering a massive outage after suffering a cyberattack this weekend that looks like a ransomware attack from conversations with customers. PrismHR...
Cybersecurity firm Qualys is likely the latest victim to have suffered a data breach after a zero-day vulnerability in their Accellion FTA server was exploited to steal...