The discovery of exploitable weaknesses in Log4j is resurfacing a 6-year-old push to save taxpayers money by calling on agencies to embrace open-source code. Leading cybersecurity...
The discovery of exploitable weaknesses in Log4j is resurfacing a 6-year-old push to save taxpayers money by calling on agencies to embrace open-source code. Leading cybersecurity...
Success would depend to a significant degree on whether agencies require vendors of information and communications technology to provide a software bill of materials with their...
An audit conducted by the VA’s Office of Inspector General found unaddressed security vulnerabilities and deficient devices at the Harlingen VA Health Care Center. An IT...
https://player.vimeo.com/video/751637270?h=a8c14c5f43&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 In this Help Net Security video, Igal Lytzki, Incident Response Analyst at Perception Point, discusses a recent Remcos RAT malware campaign and more broadly, the threat...
GAO identified six areas that require more oversight, as Defense warfighting operations and national security increasingly hinge on data security. The new wave of major national...
With international tensions heightened as we enter month eight of the war between Russia and Ukraine, it’s clear that a new era of intensifying state-sponsored attacks...
An unsealed indictment from the Department of Justice accompanied sanctions and an advisory with international allies warning against government-linked Iranian hackers. Multiple federal agencies announced new...
The Office of the National Cyber Director has a workforce plan in development that looks to address public sector and private sector gaps in the cybersecurity...
The new rules elaborate on what kinds of cyber activities warrant sanctions designation. The Treasury Department blocked U.S. persons and entities from engaging in property transactions with...
Recent Comments