SIEM is now a fundamental security component of modern enterprises. The major reason is that each customer or tracker creates...
Three department IT leaders share their top asks from the new Congress and yet-to-be-appointed federal CIO. Agency chief information officers want the new Congress and incoming...
In multiple hearings, lawmakers sought solutions to pressing technology-based security issues. Throughout a series of Hill hearings covering various defense topics—the future of budgets, security threats...
The Homeland Security Department warns it never solicits money over the phone. Fraudsters impersonating U.S. Border Patrol agents and other federal officials are trying to steal...
The group initiated 23 new projects and transitioned 11 capabilities to Defense Department partners last year, according to its annual report. Five years after it was...
Supposedly benign behaviors exhibited by JSON parsers can introduce a variety of security risks arising from how data is interpreted across multiple parsers, security researchers have found. Of...
An upcoming upgrade to WordPress will make it much easier for website owners to upgrade from HTTP to HTTPS. WordPress 5.7 – currently available as a beta release and...
A legal demand has allegedly prevented a security conference speaker from holding a talk on Xerox printers. On February 18, a copy of a notice published...
Malaysia Airlines has confirmed it has suffered a “data security incident” via a third-party IT service provider. The company also said the breach had not affected...
Synopsys Cybersecurity Research Center (CyRC) researchers have discovered CVE-2020-27223, a denial of service vulnerability in Eclipse Jetty, a widely used open source web server and servlet container. According...
Positive Technologies security researcher Alexander Popov has discovered and fixed five similar issues in the virtual socket implementation of the Linux kernel. These vulnerabilities could be exploited...
Recent Comments