Organizations in India face a six-hour data breach reporting deadline, following the introduction of new rules by the country’s computer emergency response team, CERT-In. The new rules will...
The White House announced new plans to promote quantum technology research and development while helping U.S. computer networks transition to post-quantum cryptography standards. The Biden administration...
While the government is focused on the dangers of ransomware, phishing campaigns can circumvent the usual protections placed on its networks. Over the past couple years,...
A zero-day vulnerability in uClibc and uClibc-ng, a popular C standard library, could enable a malicious actor to launch DNS poisoning attacks on vulnerable IoT devices. The bug,...
The State Bar of Georgia in the US has suspended the normal operation of its website following “unauthorized access to its network”. The authorized access by as-yet...
Comments are due June 27 on an associated draft special publication. The National Institute of Standards and Technology wants to know how it did building a...
The Open Web Application Security Project (OWASP) has fixed a vulnerability in its Enterprise Security API (ESAPI) that, if left unresolved, might have been abused to run path traversal attacks. The issue,...
A data breach at Riviera Utilities, a utility company serving Baldwin County in Alabama, has exposed the personal details of customers after employee email accounts were...
Open source software developers’ reputations could be abused to spread malicious NPM packages without their knowledge or consent, security researchers have revealed. On April 26, the...
The company may have the chance to negotiate exclusive intellectual property rights—with an exception for the government—to innovations emerging from the collaboration. Military officials from the...
Recent Comments