South Korean researchers (Youngjin Jin, Eugene Jang, Jian Cui, Jin-Woo Chung, Yongjae Lee, Seungwon Shin) at KAIST (Korea Advanced Institute...
Cybersecurity training today is much different than it was 10 years ago. In most organizations, we have developed training that is engaging, interactive, even enjoyable at times. Security...
Global survey of business leaders reveals pandemic-associated risks are currently top-of-mind, while technology disruptions and the future of work are concerns for the next decade Board...
How hackers utilize remote work and human error to steal corporate data Since the beginning of the pandemic, the FBI has seen a fourfold increase in cybersecurity complaints,...
In January 2021, Palo Alto Unit 42 researchers detected a new malware campaign targeting Kubernetes clusters. The attackers gained initial access via a misconfigured kubelet that allowed anonymous access....
Here are the news and updates you may have missed. The U.S. Department of Agriculture has found “no evidence” of a data breach at a payroll...
The report found weak industrial security scores driven by increases in cyber vulnerabilities negatively impacted the health of the defense industrial base in 2020. The defense...
The US Defense Advanced Research Projects Agency (DARPA) has reported back on its first ever security bug bounty program, saying the scheme has highlighted strengths as well as...
A new way to perform an XS-Leak side-channel attack has been disclosed. According to Luan Herrera, a researcher and bug bounty hunter with a particular interest in client-side, browser,...
Alejandro Mayorkas was officially sworn in as the seventh Secretary of Homeland Security. Secretary Mayorkas took the oath after the Senate voted to confirm him. As...
DH2i, provider of multi-platform Software Defined Perimeter (SDP) and Smart Availability software, announced the results of its premier Virtual Private Network (VPN) survey of IT professionals across...
Recent Comments