Censys researchers have discovered hundreds of Internet-exposed devices on the networks of U.S. federal agencies that have to be secured...
Members of the House Small Business Committee heard complaints of poor communication and coordination from the department on implementation of a controversial third-party auditing process. Rep....
The Commission has set a date to vote on its most recent order for companies to rip and replace Huawei, ZTE and other gear from their...
Security firms and the Electronic Frontier Foundation (EFF) are lobbying for reform of the Digital Millennium Copyright Act (DCMA) to protect “good faith” information security research....
A security researcher has penned a deep dive on bypassing lexical parsers with special HTML tags that leverage HTML parsing logic to ultimately execute arbitrary JavaScript code. Chris...
The National Institute of Standards and Technology (NIST) has published a new draft on ransomware guidance for organizations. The document features advice on how to defend against the malware,...
In an effort to counter the often pernicious effect of biases in artificial intelligence (AI) that can damage people’s lives and public trust in AI, the...
WorkForce West Virginia has revealed that its Mid Atlantic Career Consortium Employment Services (MACC) database was breached earlier this year, but says it has now been secured. The...
The European Union plans to stand up a new cyber unit in response to threat posed by the rising tide of cyber-attacks. The Joint Cyber Unit will...
Common misconfigurations in Active Directory Certificate Services can allow attackers to steal credentials, escalate privileges, and achieve domain persistence, security researchers have found. “In our experience,...
The PYSA ransomware gang has been using a remote access Trojan (RAT) dubbed ChaChi to backdoor the systems of healthcare and education organizations and steal data that...
Recent Comments