A vulnerability in collaboration software is undergoing “mass exploitation,” according to U.S. Cyber Command. The Cybersecurity and Infrastructure Security Agency is imploring administrators to apply recent...
The Technology Modernization Fund would get another $1 billion. The House Committee on Oversight and Reform adopted an amendment offered by Rep. Gerry Connolly, D-Va., that earmarks more...
Policymakers have been working on implementing continuous monitoring of its human assets with access to top secret information for several years, and the government should do...
A critical vulnerability in a Cisco product designed to help service providers and enterprises deploy virtualized networks can allow unauthenticated actors to bypass authentication. The security flaw, which...
Leader of a Pentagon-wide DevSecOps initiative, Nicolas Chaillan cited lack of support from senior leadership as one reason for his departure. Nicolas Chaillan—the Air Force’s first-ever...
From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information. Federal government organizations are storing, accessing and...
The Conti ransomware gang is hacking into Microsoft Exchange servers and breaching corporate networks using recently disclosed ProxyShell vulnerability exploits. ProxyShell is the name of an...
The US Federal Trade Commission (FTC) has banned a spyware developer and its CEO from operating in the surveillance market in a landmark decision hailed by anti-stalkerware campaigners....
During congressional testimony, cybersecurity firm FireEye pushed for greater liability protections to be included in a draft cyber incident reporting bill. Rep. John Katko, R-N.Y., plans...
Cybersecurity accreditation provider CREST has branded NCC Group “vicariously responsible” participants in a cheating scandal first reported last summer. In August 2020, CREST was made aware...
Recent Comments