The Department of Transportation should better implement its policies for established cyber roles, including improving training and role expectations, according...
Attackers can bypass CoTURN servers’ default access control rules and access network services behind the firewall, security researchers have discovered. One researcher speculated that, under certain circumstances, an...
Homegrown IT security company Quick Heal Technologies on Thursday said it has signed a definitive agreement to invest $2 million (nearly Rs 14.7 crore at current...
Canadian data security startup Qohash this week announced it raised CAD 8 million (approximately USD $6.3 million) in Series A funding. The financing was led by...
The U.S. National Security Agency on Friday announced that Rob Joyce, an official who is highly respected in the cybersecurity community, has been named the agency’s...
There are people out there trying to take advantage of the only way to date during a pandemic. As politicians play whack-a-mole with COVID-19 infection rates...
Revised guidelines on technology risk management include instructions for financial institutions to exercise “strong oversight” of arrangements with third-party service providers to ensure data confidentiality and...
Several Magecart groups hide their JavaScript skimmers, phishing domains and other malicious tools behind a “bulletproof” hosting service called Media Land, according to a report from...
52% of organizations experienced a malware incident on remote devices in 2020, up from 37% in 2019, a Wandera report reveals. Of devices compromised by malware...
A new coalition of cybersecurity and tech groups is looking to create a roadmap for countering the surge of ransomware attacks that plagued city governments, schools...
With more data pouring into cloud services, the need to protect that data from being stolen or encrypted by a ransomware attack has never been higher....
Recent Comments