The agency also shared how it’s thinking about defining “critical software,” which is to be prioritized under the order. The National Institute of Standards and Technology...
Akamai has offered a deep dive analysis of a recently patched flaw in its Enterprise Application Access (EAA) access control and authentication platform. EAA allows enterprise users to make access...
ANALYSIS In McMorris v. Carlos Lopez & Associates, LLC, the US Second Circuit Court of Appeals weighed in on one of the most impactful issues in data breach class action...
The action demonstrates the department’s authorities beyond attributing malicious cyber activity. The day after Microsoft flagged an intrusion into the U.S. Agency for International Development, Justice...
One high-profile expert raised the ever-looming workforce challenge in suggesting the juice might not yet be worth the squeeze. The National Telecommunications and Information Administration is...
Russian coders have little choice but to work with their government, which in turn denies any knowledge of their activities. That’s why hacking activity shows no...
As agencies rethink making temporary remote arrangements permanent, officials should start with proven ubiquitous encryption technology. The COVID-19 pandemic has forced many organizations to adapt to...
A remote code execution (RCE) vulnerability in the client application of Overwolf, the popular gaming development platform, has been patched. The critical flaw (CVE-2021-33501), which has a CVSS...
Last month, we caught up with the three friends – Ron Chan, ‘FileDescriptor’, and ‘EdOverflow’ – behind the ethical hacking video channel Reconless. With around 8,000 subscribers, Reconless is...
Many electronic reading (e-reading) systems that support the open EPUB format have significant security vulnerabilities, new research shows. The EPUB format relies primarily on XHTML and...
Recent Comments