ASUS has recently released a security advisory in which several ASUS critical router vulnerabilities have been fixed. The vulnerabilities were...
The US Department of Justice (DOJ) announced today that a Latvian national was charged for her alleged role as a malware developer in the Trickbot transnational...
The recent ransomware attack on Colonial Pipeline inspired a threat actor to create a new phishing lure to trick victims into downloading malicious files. The emails are targeted and...
Google has announced a new experimental Abuse Research Grants Program for abuse-related tactics and product issues outside the scope of existing Vulnerability Research Grants and the...
Microsoft has launched the Automatic HTTPS feature to improve security in the Edge browser. The Redmond giant announced the addition of Automatic HTTPS on June 1. Beginning...
A Defense Department official said DOD’s 5G prototyping is also examining the benefits of hardware and software bills of materials to scrutinize the supply chain. The...
House Oversight Committee leaders want to know what vulnerabilities remote-access software introduced and whether agencies mitigated them. As employees—including the federal workforce—start going back to the...
The order calls for modernizing the cloud-security program and opens the door for other frameworks to be used for authorization. The Biden administration’s recently released cybersecurity-focused executive...
Korenix has patched multiple vulnerabilities in a range of devices used across critical infrastructure industries. Korenix Technologies, a subsidiary of Sweden-based Beijer Electronics, manufactures wired and wireless products...
The White House has issued an open letter to companies, urging them to take immediate steps to prepare for ransomware attacks, following a string of cyberattacks...
Are you ready for hybrid work? Though the hybrid office will create great opportunities for employees and employers alike, it will create some cybersecurity challenges for...
Recent Comments