The Clop ransomware gang has been looking for ways to exploit a now-patched zero-day in the MOVEit Transfer managed file...
Device Centric Risk Management (DCRM) is a layered approach to cybersecurity that protects each device, driving remediation and mitigation directly on medical and IoT assets. To find out...
Lt. Gen. Dennis Crall said the strategy has been briefed to the Chairman of the Joint Chiefs of Staff and the deputy secretary of defense. The...
For the Department of Education, proactive threat hunting means not just taking down questionable URLs but buying them up. New authorities allowing the Cybersecurity and Infrastructure...
The vulnerabilities led to the compromise of government agencies early last summer and, together with a newly disclosed flaw, continue to be exploited. Federal agencies have...
A recent lapse in DEF CON’s warrant canary being updated on time should not be taken as a sign of a subpoena but was simply due...
FireEye has released details of zero-day vulnerabilities in SonicWall’s Email Security software which allowed attackers to obtain access to corporate networks and install backdoors on victim devices. In...
The login names and passwords for 1.3 million current and historically compromised Windows Remote Desktop servers have been leaked by UAS, the largest hacker marketplace for...
WhatsApp malware dubbed WhatsApp Pink has now been updated with advanced capabilities that let this counterfeit Android app automatically respond to your Signal, Telegram, Viber, and...
Facebook’s long-term strategy is to desensitize users about leaked data dumps that were collected through scraping the public portion of the social network. The plan was...
JupiterOne, provider of cyber asset management and governance solutions, announced the hiring of Sounil Yu as Chief Information Security Officer, and the appointment of Latha Maripuri...
Recent Comments