The federal government currently deems 16 sectors as critical infrastructure sectors because of their importance. Space experts Wednesday urged the federal government to classify certain space...
A private surveillance firm that exploits mobile network vulnerabilities to spy on calls, texts and location data is doing business with at least 25 governments around...
Recently, Check Point researchers unveiled that the Black Caracal threat group is very much alive and active. The scoop The Dark Caracal APT group is believed...
URL shorteners have a notorious reputation for being bad for both privacy and security. Users often use them to share sensitive, unprotected files stored in the cloud via...
Cybercriminals have been caught exploiting misconfigured Docker installations to spread crypto-mining malware. Researchers at Cisco Talos identified the tactic after a cryptocurrency-mining botnet strayed onto a...
UPDATED Unpatched vulnerabilities in the OpenClinic healthcare records management application could allow attackers to access confidential patient data. Some of four zero-day vulnerabilities discovered by security researchers at Bishop Fox also...
In the fallout from being fired, the former director of the Cybersecurity and Infrastructure Security Agency is concerned about how his experience will affect the recruitment...
COVID-19 has changed the rules for enterprise security, as it has forced a move to work-from-home (WFH) environments for many companies. And this will last beyond...
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have observed persistent continued cyber intrusions by advanced persistent threat (APT) actors...
ESET researchers discovered a previously undocumented backdoor and document stealer used for cyber-espionage. ESET has been able to attribute the program, dubbed Crutch by its developers,...