The commonly used “net” library in Go and Rust languages is also impacted by the mixed-format IP address validation vulnerability. The bug has to do with how net treats IP addresses as...
Public feedback on the more than 200-page document will be considered in the near future. In a draft update to its flagship cyber resiliency publication released...
The effort includes partnerships with several major tech companies. The Cybersecurity and Infrastructure Security Agency will work with agency stakeholders and new private-sector partners to minimize...
Commercial products bought without modification are largely exempt from government acquisition regulations, including the Defense Department’s emerging certification program. The vast majority of commercial-off-the-shelf products examined...
The Chaos Computer Club (CCC), a Germany-based association of hackers, has announced that it will stop cooperating with the Christian Democratic Union (CDU), Germany’s ruling political party,...
Lawmakers look to grow an already lengthy to-do list at the Cybersecurity and Infrastructure Security Agency. A bill giving the Cybersecurity and Infrastructure Security Agency authority...
The Energy Department has an obligation to protect both public and private energy interests on critical infrastructure. This year has been a pivotal year for malicious...
Security researchers have discovered a new class of DNS vulnerability that affects multiple DNS-as-a-Service (DNSaaS) providers. Researchers from cloud security firm Wiz.io discovered that non-standard implementation of DNS resolvers, when...
An open source tool designed to help organizations identify credential leaks was showcased publicly for the first time at Black Hat USA yesterday (August 4). Scrapesy, developed by...
Old fashioned data theft is still the main reason adversaries are targeting a popular open-source application management system. U.S. cybersecurity agencies are following up on a...
Recent Comments