In response to ongoing cybersecurity events, the National Security Agency (NSA) released a Cybersecurity Advisory “Detecting Abuse of Authentication Mechanisms.” The advisory provides guidance to National Security System...
There is an old saying that “There is strength in numbers.” But what happens when that strength is on the side of the intent to do harm? ...
There’s no doubt that 2020 will be remembered for the uncertainty and rapid change it brought. As the global pandemic accelerated trends like remote working and digital transformation,...
A team of security researchers has developed a DIY appliance to detect stalkerware and other malware on smartphones. TinyCheck is open source software designed to be...
(Bloomberg) — VMware Inc. fell 5.4% after a cybersecurity expert said a flaw in the company’s products was partly responsible for the SolarWinds breach that is...
This marks the second time browsers makers had to intervene and block a certificate used by the Kazakhstan government to spy on its citizens. Browser makers...
The Defense and Homeland Security departments agreed to develop cybersecurity technologies for national security applications together. The Defense Innovation Unit and the Cybersecurity and Infrastructure Security...
The Cybersecurity and Infrastructure Security Agency (CISA) and government and industry members of the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force released an...
The hackers behind Zebrocy malware have added a new chapter in their malware delivery tactics book. Key points about new Zebrocy variants Researchers at Intezer have analyzed the...
Security vulnerabilities in the direct file transfer applications of popular smartphone makers allow attackers to send malicious files to mobile devices, a security researcher has found. In a...