A new cybercrime outfit that calls itself RansomHouse is attempting to carve out a niche of the cyber extortion market for itself by hitting organizations, stealing...
Witnesses from CIST, NIST, and the GSA spoke before a House Homeland subcommittee on their current efforts to bolster the nation’s cyber defenses. Lawmakers explored courses...
I’m a pentester – that is, a professional penetration tester. Some call me an ethical hacker, a white hat, or red teamer. In the heat of the...
NICE Actimize has released a report that identifies and analyzes the leading fraud threats and patterns that impacted leading global financial institutions in 2021. Noting that banking fraud...
Advanced adversaries appear to be exploiting the vulnerabilities to get around multifactor authentication. Federal agencies must report to the Cybersecurity and Infrastructure Security Agency over the...
HP announced that the HP Wolf Security threat research team has identified a 27-fold increase in detections resulting from Emotet malicious spam campaigns in Q1 2022, compared to...
The Commission welcomes the political agreement reached between the European Parliament and EU Member States on the Directive on measures for a high common level of cybersecurity across...
One year after the president’s executive order on improving the nation’s cybersecurity, federal agencies are making steady progress toward their zero trust security goals, according to a study...
A joint advisory from CISA, domestic partners and counterpart agencies in the Five Eyes intelligence alliance warns of a heightened threat to managed service providers and...
https://player.vimeo.com/video/706835168?h=7a0794c199&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Hardware attacks are becoming more and more sophisticated. There are several reasons this could be happening: Security increasingly supported in hardware – Mistakes can introduce severe vulnerabilities...
Recent Comments