Government imposter scams now come with a new twist that has the potential to make them even more effective, as the Inspector General for the Social...
All agencies must report their status to CISA by noon on March 5. Federal agencies must track and capture data related to all on-premises Microsoft Exchange...
Three department IT leaders share their top asks from the new Congress and yet-to-be-appointed federal CIO. Agency chief information officers want the new Congress and incoming...
In multiple hearings, lawmakers sought solutions to pressing technology-based security issues. Throughout a series of Hill hearings covering various defense topics—the future of budgets, security threats...
The Homeland Security Department warns it never solicits money over the phone. Fraudsters impersonating U.S. Border Patrol agents and other federal officials are trying to steal...
The group initiated 23 new projects and transitioned 11 capabilities to Defense Department partners last year, according to its annual report. Five years after it was...
Supposedly benign behaviors exhibited by JSON parsers can introduce a variety of security risks arising from how data is interpreted across multiple parsers, security researchers have found. Of...
An upcoming upgrade to WordPress will make it much easier for website owners to upgrade from HTTP to HTTPS. WordPress 5.7 – currently available as a beta release and...
A legal demand has allegedly prevented a security conference speaker from holding a talk on Xerox printers. On February 18, a copy of a notice published...
Synopsys Cybersecurity Research Center (CyRC) researchers have discovered CVE-2020-27223, a denial of service vulnerability in Eclipse Jetty, a widely used open source web server and servlet container. According...