A former US Congress system administrator has suggested that the Capitol Building’s IT networks may need to be “rebuilt from scratch” after Republican rioters breached the...
First, the facts. Last November the world learned that IoT systems manufacturer Advantech had suffered a ransomware attack. Bleeping Computer traced the infection back to the Conti ransomware...
After hacking masked credit and debit card data of crores of Juspay users, the same hacker possibly known as ‘ShinyHunters’ is now selling databases belonging to...
Recently Intezer researchers discovered a new and self-spreading Golang-based malware that continues the popular 2020 trend of multi-platform malware. This new crypto-mining malware exploits known vulnerabilities...
Enterprise security firm Fortinet has resolved a variety of vulnerabilities in its network security appliances. The FortiWeb web application firewall (WAF) is designed to shield servers...
UPDATED Security vulnerabilities and other software shortcomings cost the US economy more than $2 trillion in 2020, according to a new report. Operational software failures were by...
CISA has released Emergency Directive (ED) 21-01 Supplemental Guidance version 3: Mitigate SolarWinds Orion Code Compromise, providing guidance that supersedes Required Action 4 of ED 21-01 and...
The COVID-19 pandemic shocked the world and changed how businesses operate overnight, both internally and in their interactions with customers. The event forced major changes that...
Fortified Health Security, Healthcare’s Cybersecurity Partner released the 2021 Horizon Report, which details findings that illustrate how, as healthcare organizations continue to respond to the pandemic, cybercriminals...
During an extraordinary day of unrest in the Capitol, here are the news and updates you may have missed. The Justice Department acknowledged its email was...