Security researchers found vulnerabilities in the encryption mechanism of the Zeppelin ransomware and exploited them to create a working decryptor they used since 2020 to help victim...
The Secret Service’s plan for adopting a zero trust architecture model across the agency’s systems has not been updated since the Office of Management and Budget...
The Office of Management and Budget released new guidance to begin the governmentwide effort to safeguard digital infrastructure from quantum attacks. The White House’s Office of...
It’s definitely no secret that antivirus software is an essential part of your computer. However, these threats don’t stop at your devices. For example, criminals that...
The 120-day sprint saw more than 7,000 apprentices get hired from the initiative. The Biden administration has ended the 120-day Cybersecurity Apprenticeship Sprint on Tuesday—during National Apprenticeship Week—as...
The Government Accountability Office found that the Pentagon “lacks an accountable organization and consistent guidance” for documenting and sharing details about reported cyber incidents. Although the...
The agency also suggested existing sectors be consolidated and that there is a need for some agencies to exercise greater authority over private-sector entities. Leading cybersecurity...
Actors linked with the Iranian government were able to exploit an unpatched Log4Shell vulnerability—which the Cybersecurity and Infrastructure Security Agency asked agencies to address by the...
Malicious actors can stage cross-site scripting (XSS) attacks across the subdomains of a website if they can trick users of Chromium browsers into entering a simple...
Zero trust is a concept that’s easy to grasp but incredibly difficult to implement. It touches almost every system, component, application, and resource within an enterprise, and...