Hackers exploited a Level Finance smart contract vulnerability to drain 214,000 LVL tokens from the decentralized exchange and swapped them...
A security researcher says he has been banned from online multiplayer game Call of Duty: Modern Warfare after reverse engineering its networking code in pursuit of...
Meet Ian Thornton-Trump. He is the Chief Information Security Officer at Cyjax, and an ITIL certified IT professional with 25 years of experience in IT security...
Crash analysis firm ZecOps has batted away criticism that a recently released iOS exploit presents a privacy risk for researchers that use it. The proof-of-concept (PoC)...
A cyber-attack at a UK floor covering distributor has resulted in the exposure of some data, the company confirmed today (November 24). Headlam Group, based in Birmingham...
CRM software and cloud services provider Salesforce has made its JARM fingerprinting tool open source, allowing users to identify and group malicious servers. The Transport Layer Security (TLS)...
The chair and ranking member of the House Energy and Commerce Committee are assuring the head of the Federal Communications Commission that between $1-2 billion dollars...
For most of 2020, federal agencies—staffed by hundreds of thousands of federal employees and contractors—have turned to telework to meet mission delivery, serve citizens and perform...
Attorney General Kathy Jennings announced that Delaware has joined a total $17.5 million settlement against Georgia-based retailer The Home Depot, resolving a multistate investigation of a...
The year 2020 has been a whirlwind of adaptation and change, prompting the phrase “business as usual” to take on a whole new meaning. The Center...
NSA’s National Cryptologic Museum (NCM) is thriving and plans to keep growing as it welcomes a new Director. As the Agency’s principle gateway to the public,...
Recent Comments