Data theft is the act of stealing data stored in business databases, endpoints, and servers. The stolen data can include...
Fox Kitten, an Iranian-backed hacking group, has been linked with the Pay2Key ransomware operations that eye on organizations in Israel and Brazil. What happened? This particular ransomware...
The Department of Homeland Security (DHS) issued a business advisory to American businesses warning of risks associated with the use of data services and equipment from...
The Cybersecurity and Infrastructure Security Agency (CISA) is tracking a known compromise involving SolarWinds Orion products that are currently being exploited by a malicious actor. An...
Meet Ali Golshan, CTO and co-founder at StackRox, a Mountain View, Calif.-based leader in security for containers and Kubernetes. Prior to StackRox, he was the Founder & CTO...
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) published the Resilient Positioning, Navigation, and Timing (PNT) Conformance Framework today. PNT services, such as...
As many as one in 20 web servers could be vulnerable to a weakness in the Linux kernel, according to security researchers. The same weakness could also expose...
A raft of pre-authenticated vulnerabilities in the aged but widely used Treck TCP/IP stack can lead to both denial-of-service (DoS) and remote code execution (RCE) on target systems....
The environment where updates for the company’s software were developed was reportedly protected by a password anyone could guess. In the wake of the SolarWinds hack,...
Here are the news and updates you may have missed. The Cybersecurity and Infrastructure Security Agency released a guide for federal, state and local government leaders...
We should build security into the foundation of programs. Our current approach to cybersecurity, specifically within the public sector, is not working. We continue to spend...
Recent Comments