After noting the increasing number of cyberattacks on U.S. networks, the SEC is asking company leadership for quick cyber incident disclosures and more documentation. The Securities...
Cloud cryptojacking disguises itself as cloud computing resource abuse, where threat actors exploit legitimate tenants for cryptocurrency mining using their computing power. Cloud computing abuse leads to...
The ecommerce industry is on the rise. According to Statista, global e-commerce sales amounted to approximately $5.2 trillion. Moreover, experts predict this figure to reach about...
VA Chief Information Officer Kurt DelBene told Nextgov/FCW that the department “faces a unique challenge” in adopting zero trust because of the need to secure veterans’...
White House officials named former National Security Agency official Harry Coker, Jr. as the nominee to replace former National Cyber Director Chris Inglis amid the ongoing...
Apple has issued security patches to address zero-day vulnerabilities that have been exploited in attacks against iPhones, Macs, and iPads that seriously affect the digital security of Apple...
CISA’s Continuous Diagnostics and Mitigation program uses close collaboration with federal agencies to identify and respond to cyber threats, including last month’s MOVEit breach. The Cybersecurity...
This isn’t the first DHS agency to come under fire for its access control deficiencies. U.S. Immigration and Customs Enforcement isn’t consistently implementing controls to prevent...
A new report noted that a lack of “established policies and procedures” could prevent the tax agency from meeting federal requirements. An Internal Revenue Service watchdog...
The Virustotal platform has issued an apology and provided an update regarding a recent incident of accidental data exposure. VirusTotal was established in 2004 as a...
Recent Comments