An unknown threat actor is brute-forcing Linux SSH servers to install a wide range of malware, including the Tsunami DDoS...
The former chief operating officer of Securolytics, a network security company providing services for the health care industry, was charged with allegedly conducting a cyberattack on...
Unprivileged attackers can get a root shell by exploiting an authentication bypass vulnerability in the polkit auth system service installed by default on many modern Linux...
Foodservice supplier Edward Don has suffered a ransomware attack that has caused the company to shut down portions of the network to prevent the attack’s spread....
CD Projekt is warning today that internal data stolen during their February ransomware attack is circulating on the Internet. In February, CD Projekt suffered a ransomware attack that...
High-performing security organizations driving dramatic and substantive change, and reaping the benefits of going “all in” on cloud Devo Technology announced the results of a report assessing...
Members of the Senate Homeland Security Committee pressed Jen Easterly and other key nominees on supply chain security and workforce challenges. Congress should pursue efforts to...
The Government Accountability Office found programs face challenges with agile deliveries and cybersecurity testing. Defense Department weapon systems programs may be turning to cutting-edge software development...
The SIP communications protocol can be abused to perform cross-site scripting (XSS) attacks, new research has revealed In a blog post on Thursday (June 10), Enable Security’s Juxhin Dyrmishi Brigjaj...
The past year’s COVID-19 pandemic marked an unparalleled turning point that has completely changed the world as we know it. When businesses and organizations from many...
Media network Al Jazeera claims to have overcome a series of cyber-attacks that were indented to “access, disrupt, and control” some of its news platforms and websites. In...
Recent Comments