A ransomware attack on Taiwanese electronics giant Foxconn has resulted in hackers demanding $34.7 million in Bitcoin. Cybercriminals infiltrated Foxconn’s networks on November 29, stealing and encrypting files and deleting...
An effort to establish a public-private collaboration environment was cut from the final bill but a controversial insurance provision was retained. Key lawmakers in the House...
The IoT Cybersecurity Improvement Act has been officially signed into law. The bipartisan legislation, sponsored by Reps. Robin Kelly, D-Ill., and Will Hurd, R-Texas, and Sens. Mark Warner,...
One supporter notes Congress is not the only path to success and is also counting on an incoming Biden administration to reshape the program. This year’s...
If you find the hidden message, you might be someone the incoming administration wants to hire. The incoming Biden-Harris administration is hiding job opportunities in unlikely...
The proliferation of consumer-grade communications applications has given rise to widespread, unsanctioned use throughout the military community. After nearly two decades on the ground, President Trump’s...
U.S. Cyber Command said the Cyber Training Capabilities Project Arrangement is the first-ever agreement to develop the Army’s Persistent Cyber Training Environment together. The U.S. and...
Iranian cyber threat actors have been continuously improving their offensive cyber capabilities. They continue to engage in more conventional offensive cyber activities ranging from website defacement,...
A key architect of the bill’s cyber provisions also highlighted an amendment that would codify cybersecurity roles for sector-specific agencies. Language calling for a national cyber...
The agencies share guidance for shoring up defenses in a remote work environment that can disguise attackers. The Cybersecurity and Infrastructure Security Agency and the FBI...