Recent reports suggest threat actors have used phishing emails to distribute fileless malware. The attachment consists of a .hta (HTML...
The role of info stealers (aka stealers) in the cybercrime world has been growing, according to researchers at the SecureWorks Counter Threat Unit (CTU). While threat...
Trend Micro researchers have been monitoring a threat actor known as Water Orthrus since 2021, as they employed pay-per-install networks to distribute the CopperStealer malware. The...
The two measures, which passed the committee with bipartisan support, would give CISA authority across DHS and the federal government. Lawmakers on a key House panel...
The critical infrastructure experts upheld common cybersecurity standards as a key to resilient networks and private sector collaboration. Leadership across three agencies at the forefront of...
The legislation was introduced in early May. A Senate bill that would require the Cybersecurity and Infrastructure Agency to provide commercial satellite owners and operators with...
Over the years, mobile devices like smartphones, tablets, and laptops have been extensively used to get work done, primarily due to these powerful devices facilitating mobility...
The growth reflects rising concern about the potential threat posed by fully realized quantum computers. The global quantum cryptography market will be worth an estimated $500...
The Department of Transportation breach exposed the data of 237,000 current and former employees. The Department of Transportation’s administrative systems were hacked, exposing the data of...
The Department of Transportation should better implement its policies for established cyber roles, including improving training and role expectations, according to a recent GAO report. The...
Hackers are actively exploiting a recently fixed vulnerability in the WordPress Advanced Custom Fields plugin roughly 24 hours after a proof-of-concept (PoC) exploit was made public....
Recent Comments