The White House is leading an interagency effort focused on software development that will determine federal procurement of information technology. The government is just weeks out...
Smart threat intelligence starts with good data. In the near future, artificial intelligence-driven cyber operations will play an outsized role in how the federal government protects...
A newly published report form the U.S. Government Accountability Office (GAO) describes the risks of cyber-attacks on the electricity grid’s distribution systems, along with the scale...
A security vulnerability that allowed attackers to disclose Actions secrets in GitHub repositories has been patched, and the researcher who discovered the bug was awarded $25,000. On March...
A Cypriot man has been jailed in the US over a scam that involved extorting website operators with stolen personal information. Joshua Polloso Epifaniou, 22, of Nicosia, threatened...
The experts say the sorts of rudimentary vulnerabilities revealed in the breach are common among America’s 151,000 public water systems. On Feb. 16, less than two...
The commission is also seeking public comment on the development of Open Radio Access Networks to improve national security and prosperity. The Federal Communications Commission initiated...
HP threat intel team reveals rising web browser exploits, RAT-infested delivery alerts, DOSfuscation and other hacker activity HP Inc. released its new Quarterly Threat Insights Report,...
The agencies’ guide on selecting a provider of protective DNS services is based on a pilot with the Department of Defense Cyber Crime Center. Federal cybersecurity...
Since the recent boom in the prices of cryptocurrencies, cybercriminals are continuously targeting cryptocurrency platforms and exchanges, using a wide variety of attack tactics. Bitdefender Antispam...