Security researchers are compiling an easy-to-follow list of vulnerabilities ransomware gangs and their affiliates are using as initial access to breach victims’ networks. All this started...
Hacktivists affiliated with Anonymous are pouring over the entrails of a cyber-attack against controversial web host Epik that led onto the leak of customer data. US-based web host...
After pledging $100 million towards improving open source security last month, Google is sponsoring security reviews of eight projects through a partnership with the Open Source Technology Improvement...
The Department of Homeland Security Inspector General report on dam security found a lack of coordination among agency teams. The Cybersecurity and Infrastructure Security Agency is...
John Sherman, currently serving in an acting capacity, will step down during the confirmation process. President Joe Biden nominated the Defense Department’s Acting Chief Information Officer...
The allied trio will also work on getting Australia a nuclear-powered submarine. A new security arrangement between the U.S., the United Kingdom and Australia will focus...
The American Federation of Government Employees says private-sector stake in the provision is based on companies seeking a competitive advantage. Short-term appointments to cybersecurity and technology...
The largest chunk of funds would go toward implementing a May 12 executive order focused on cybersecurity. The House Homeland Security Committee Tuesday approved an additional...
Maritime ransomware attacks are on the rise. Like nearly all sectors of the economy, maritime and offshore energy activities are being increasingly conducted remotely, with networked...
The last year has seen a massive rise in the number of software supply chain attacks aimed at upstream public repositories, a new report has revealed. According to...
Recent Comments