The United States is facing an unsustainable demand for water and lacks the security posture to defend the nation’s water...
The funding will go to nine universities in 2023 to support building the next generation of cyber professionals. The National Science Foundation added more than $29 million in...
Hack the Pentagon 3.0 will focus on the operational technologies within Defense Department headquarters. The Defense Department is planning the third iteration of its Hack the...
Slack suffered a security breach recently, “involving unauthorized access to a subset of Slack’s code repositories” according to the messaging platform. The company said that although no customers were...
A new tool enables developers to better protect themselves against vulnerabilities in popular file converter ImageMagick, which has suffered from various security holes in the past....
Online markets selling drugs and other illegal substances on the dark web have started to use custom Android apps for increased privacy and to evade law...
The Kinsing malware is now actively breaching Kubernetes clusters by leveraging known weaknesses in container images and misconfigured, exposed PostgreSQL containers. While these tactics aren’t novel,...
Regular penetration testing is an important step in developing secure web applications. This process helps organizations discover and patch vulnerabilities before attackers can exploit them. This...
The StrongPity APT hacking group is distributing a fake Shagle chat app that is a trojanized version of the Telegram for Android app with an added...
Des Moines Public Schools, the largest school district in Iowa, canceled all classes on Tuesday after taking all networked systems offline in response to “unusual activity”...
Researchers at the universities of California, Virginia, and Microsoft have devised a new poisoning attack that could trick AI-based coding assistants into suggesting dangerous code. Named...
Recent Comments