The legislation was introduced in early May. A Senate bill that would require the Cybersecurity and Infrastructure Agency to provide...
Official says a selection of the first contractors to be audited will be vetted by members of the new administration. The Department of Defense is figuring...
VPN providers should adhere to a minimum standard of ethics to deter cybercriminals from taking advantage of their privacy-enhancing software. That is the stance taken by industry group...
Carders, fraudsters, and other cybercriminals will be quick to migrate to other nefarious platforms if infamous darknet site the Joker’s Stash closes as promised next month,...
The vast majority of the most popular Windows-native PDF viewers were vulnerable to multiple attack techniques exploiting standard PDF features, a team of security researchers has discovered. Several...
INTERVIEW Ranking among the top 10 hackers on bug bounty platform YesWeHack’s all-time leaderboard, Raphaël Arrouas’ methodologies will be of interest to security researchers of all abilities. Arrouas,...
Opening a website with an embedded YouTube video potentially allowed miscreants to access a user’s viewing history, favorites, and playlists. The security bug – which earned...
WhiteHat Security, a San Jose, Calif.-based provider of application security, announced the launch of AppSec Stats Flash, a monthly podcast and statistics report aimed at providing a...
New research from Digital Shadows shows how cybercriminals are increasingly setting their sights on asset and wealth management companies (AWM). The assets under management by AWM...
Code42 pulled some anonymized, aggregated data from Incydr, a SaaS data risk detection and response solution, showing how users move and exfiltrate data and files. The most exposed type?...
Kroll, a division of Duff & Phelps, provider of risk mitigation, investigations, compliance, cyber resilience, security and incident response solutions, announced the hiring of three seasoned cyber...
Recent Comments