The agencies’ guide on selecting a provider of protective DNS services is based on a pilot with the Department of Defense Cyber Crime Center. Federal cybersecurity...
They want the U.S. government to gain a better grasp of the rapidly emerging landscape of virtual currencies, smart contracts and other commodities. New House legislation...
The Telecommunications Industry Association published a new white paper on SCS 9001, the first process-based supply chain security standard for the information communications technology (ICT) industry. With sophisticated supply...
Critical vulnerabilities in LocalStack, a popular framework for building cloud applications, can be chained to remotely take over locally-run LocalStack instances, security researchers claim. Researchers from...
A new online service allows security researchers to search for exposed shortened URLs, known for their risks to security and privacy. Shortened URLs are comparatively easy to brute-force,...
Since the recent boom in the prices of cryptocurrencies, cybercriminals are continuously targeting cryptocurrency platforms and exchanges, using a wide variety of attack tactics. Bitdefender Antispam...
Attackers often keep upgrading their tools to scan for and infect new devices by exploiting unpatched vulnerabilities. Recently, the z0Miner cryptomining malware was spotted probing cloud...
A Utah company has exposed the sensitive information of more than 50,000 customers by storing data on an unsecured server. The breach at Premier Diagnostics was discovered on...
Washington DC congresswoman Suzan DelBene has introduced legislation that would create a national data privacy law in the US. With no federal law currently in place...
The marketplace was built as part of a recent Defense Department initiative aimed at advancing microelectronics technologies. IBM announced the establishment of a new marketplace inside...
Recent Comments