The Monti ransomware gang has returned, after a two-month break from publishing victims on their data leak site, using a new...
Kubernetes is delivering business value and is set to win an increasing share of production workloads, with almost all respondents to a Dimensional Research study saying they...
A cross-site scripting (XSS) vulnerability in AMP for Email, Gmail’s dynamic email feature, has netted a security researcher a $5,000 bug bounty payout. AMP for Email brings AMP...
A critical security vulnerability impacting DrayTek Vigor routers could allow unauthenticated attackers to gain full access to victim networks. The flaw affects the Taiwanese hardware manufacturer’s...
A critical authentication bypass flaw in an NPM package could allow a malicious actor to take over a victim’s email account. The vulnerability, which was rated...
How to entice more students studying cybersecurity to work in government. Many federal officials are worried about closing the government’s large and growing cybersecurity talent gap—as...
CISA is ramping up efforts to defend voting systems from outside intrusion, but the spread of online misinformation and threats against election officials still damage faith...
Researchers at Trellix have discovered a critical unauthenticated remote code execution (RCE) vulnerability impacting 29 models of the DrayTek Vigor series of business routers. The vulnerability...
The Forum of Incident Response and Security Teams (FIRST) has published TLP 2.0, a new version of its Traffic Light Protocol (TLP) standard, five years after...
Hackers attempted to extort the online survey platform QuestionPro after claiming to have stolen the company’s database containing respondents’ personal information. QuestionPro is an online service...
The Department of Homeland Security (DHS) warned that attackers could exploit critical security vulnerabilities in unpatched Emergency Alert System (EAS) encoder/decoder devices to send fake emergency...
Recent Comments