Debate is heating up over the role of sector-risk management agencies in shoring up security of the nation’s critical infrastructure. National Cyber Director Chris Inglis made...
Two companies are embarking on a fresh agreement to help pave the way toward JADC2. Northrop Grumman Corporation and AT&T unveiled joint plans on Tuesday to...
Trend Micro has advised customers to update its Apex Central technology following the discovery of web-based attacks targeting a newly discovered vulnerability. Both hosted and on-premises versions of...
The Cyber Security Agency of Singapore (CSA) has launched a certification program to incentivize businesses of various sizes to bolster their security posture. Launched on March 29,...
The new office will work to advance foreign and domestic security through modernizations featuring new and emerging technology. The U.S. Department of State announced Monday the...
UPDATED Attackers could have wreaked havoc on the PHP ecosystem by exploiting a pair of longstanding vulnerabilities that were only recently patched in package manager PEAR, according to security...
Cryptocurrency hardware wallet owners are being targeted by a phishing scam spread via Mailchimp email distribution services. Trezor, the manufacturer of crypto wallets, announced on social media that its customers...
A security researcher was able to achieve unauthenticated remote code execution against Cisco Nexus Dashboard Fabric Controller by exploiting an obsolete Java library with known vulnerabilities. The researcher,...
A compromised Trezor hardware wallet mailing list was used to send fake data breach notifications to steal cryptocurrency wallets and the assets stored within them. Trezor...
A new remote access trojan (RAT) named Borat has appeared on darknet markets, offering easy-to-use features to conduct DDoS attacks, UAC bypass, and ransomware deployment. As...
Recent Comments