Cyber leaders’ plan to emphasize collective defense over offense hinges on industry’s willingness to share information with government in real time. Establishing a working public-private partnership...
Yes, utilities use both IT and OT, but so do data centers. Way back in 2015, I interviewed several officials working at utility companies for a...
A security hole in the file-sharing feature of Slack enables malicious actors to identify users outside of the workforce messaging platform. Slack apparently has no plans...
University researchers in the US have developed a new fingerprint capturing and browser spoofing attack called Gummy Browsers. They warn how easy the attack is to...
A joint advisory officially associates the notorious ransomware-as-a-service group with the Colonial Pipeline attack. Federal agencies credited a trusted third-party in issuing specific detection signatures to...
The agency has an idea of what it wants from the capability but is soliciting industry input on key aspects of an enduring investment plan. A...
The threat landscape in the medical sector is massive and expanding daily with exponential growth in connected medical devices. After 2020’s performance as the worst year on...
A free decryptor for the BlackByte ransomware has been released, allowing past victims to recover their files for free. When executed, most ransomware will generate a...
The maintainers of Node.js have patched two HTTP request smuggling (HRS) vulnerabilities in the JavaScript runtime environment, including one found using what appears to be a new HRS...
The multiple bugs and coding errors in malware offer defenders a means to create better defenses. This is according to a team presenting at the Virus Bulletin conference...
Recent Comments