The management of the government’s IT acquisitions and operations is also on the Government Accountability Office’s biennial high risk list update this year, as it has...
Prosecutors unveiled charges Monday against a “troll farm” and Chinese nationals who worked with a Zoom employee to crash meetings with U.S.-based dissidents. A “secret police...
The bipartisan, bicameral legislation directs CISA to provide primary and secondary schools with more targeted cyber information and resources to combat a rise in ransomware attacks....
The Chinese-based Video surveillance equipment manufacturer has disclosed a critical flaw in their storage products, allowing threat actors to obtain admin permissions. This flaw can be...
The new guidance pushes software and technology manufacturers to take more responsibility for the security of their devices by adhering to secure-by-design and -default principles. A...
Microsoft has shared guidance to help organizations check if hackers targeted or compromised machines with the BlackLotus UEFI bootkit by exploiting the CVE-2022-21894 vulnerability. Organizations and...
A cyber attack campaign targeting WordPress websites has recently caused significant concern, with experts estimating that up to one million websites may have been compromised. The campaign has...
A threat actor group is known as “ARES” that deals in the selling of business and governmental authority databases has been detected by the CYFIRMA Research...
Google has officially confirmed that it is working on conversational artificial intelligence for its search engine since the AI evolution pressures its business. Sundar Pichai, the...
Recently, access to public Wi-Fi networks is easily feasible due to their availability in most common public places. The nature of Wi-Fi networks is such that supplicants, or...