Actors linked with the Iranian government were able to exploit an unpatched Log4Shell vulnerability—which the Cybersecurity and Infrastructure Security Agency asked agencies to address by the...
Major industry groups clashed on how CISA should define key terms in its rulemaking process to implement the federal incident reporting law. Providers of commercial information...
The panel’s report also called for the Biden administration to consider revoking China’s status as a favored trading partner if a congressional review finds that Beijing...
The Biden administration is looking to Congress for help with ‘filling gaps in statutory authorities’ for improving U.S. cybersecurity. Department of Homeland Security Secretary Alejandro Mayorkas...
The key trends for the energy industry are about how we manage the future supply and demand challenges at a much more granular level than we are currently...
Recently, California passed the California Age-Appropriate Design Code Act (CAADCA), a bill designed to protect children online. Although the bill has presented notable concerns regarding privacy...
Vulnerability management has always been as much art as science. However, the rapid changes in both IT networks and the external threat landscape over the last decade...
A threat group tracked as ‘Worok’ hides malware within PNG images to infect victims’ machines with information-stealing malware without raising alarms. This has been confirmed by...
A previously undocumented Android spyware tool named ‘BadBazaar’ has been discovered targeting ethnic and religious minorities in China, most notably the Uyghurs in Xinjiang. Uyghurs, a...
The FBI and U.S. Postal Inspection Service have seized eighteen web domains used to recruit money mules for work-from-home and reshipping scams. The seized websites claimed...