Hundreds of devices on federal networks remain in apparent violation of a recent Binding Operational Directive from the Cybersecurity and...
This chart shows the average compensation for the top 10 IT certifications for cleared and certified professionals today. Education degrees, skills, and experience all make up...
The pandemic contributed to more than 120 publicly announced cybersecurity acquisitions in 2020 as the need for cybersecurity tools grew. The COVID-19 pandemic slowed the worldwide...
CNA Financial Corporation, a leading US-based insurance company, is notifying customers of a data breach following a Phoenix CryptoLocker ransomware attack that hit its systems in...
Here is how we maximize its scale and potential. The pace at which the Biden administration and the 117th Congress are addressing gaps in our national...
The inspector general found multiple expired authorizations to operate. Some of the State Department’s key human resources information system processes are operating with expired authorities to...
A vulnerability in popular preprocessor language Less.js could be exploited to achieve remote code execution (RCE) against websites that allow users to input Less.js code, researchers have warned....
In just a few weeks’ time, a new data security law will come into force in the People’s Republic of China. The Data Security Law (DSL)...
Google has revealed how a set of internally developed browser APIs and policies can simplify the prevention of DOM-based cross-site scripting (XSS) vulnerabilities. According to a report penned by Google...
Security researchers have found more than 170 fraudulent Android apps purporting to offer cloud crypto-mining services that have collectively swindled victims out of $350,000. The app developers have...
CISA has published a new Malware Analysis Report (MAR) on DarkSide Ransomware and updated Alert AA21-131A: DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks, originally released...
Recent Comments