Threat analysts have uncovered a large-scale campaign targeting Elastix VoIP telephony servers with more than 500,000 malware samples over a period of three months. Elastix is a server...
A threat actor is infecting industrial control systems (ICS) to create a botnet through password “cracking” software for programmable logic controllers (PLCs). Advertised on various social media...
The private health information of more than 4,000 patients was left exposed for 16 years by a US medical transplant center. Virginia Commonwealth University Health System...
The English Premier League has introduced two-factor authentication (2FA) controls to its official Fantasy Premier League game (FPL), offering football fans the option to secure their accounts. The...
Sen. Gary Peters discussed how streamlined reporting to CISA can clarify the cyber threat landscape to all U.S. networks. U.S. government digital systems and infrastructure can...
Mozilla has stepped up its efforts to dissuade EU lawmakers from forcing web browsers to recognize the validity of contentious web certificates created by the bloc....
A security researcher has found that attackers could abuse the popular sticker feature in Microsoft Teams to conduct cross-site scripting (XSS) attacks. Microsoft Teams, alongside comparable teleconferencing services...
Legislation seeking to amend the annual National Defense Authorization Act wants the Government Accountability Office to investigate. A new public-private body within the Department of Homeland...
A vulnerability in AWS IAM Authenticator for Kubernetes could allow a malicious actor to impersonate other users and escalate privileges in Kubernetes clusters, a security researcher...
INTERVIEW Jon von Tetzchner has launched not one, but two web browser companies in his career. Today, he is CEO of Vivaldi Technologies, the business behind the Vivaldi browser, which...
Recent Comments