Agencies showed some slight progress on IT issues, though cybersecurity took a step backward in the latest report. The Government Accountability Office released its biennial list of...
Operating under the default position that an organization has been compromised is a pain that’s worth it, the agency said. The National Security Agency is working...
CBP One will become the primary public-facing portal for a number of customs programs and services. But any new data collection effort brings privacy risks. The...
Like many other sectors, the space industry needs to secure its supply chain from start to finish. Since President John F. Kennedy announced plans for a...
An unsecured server belonging to a data analytics company exposed an estimated 30TB of business records online, resulting in the firm being held to ransom. Polecat is a...
The Cybersecurity and Infrastructure Security Agency’s (CISA) second annual President’s Cup Cybersecurity Competition concluded last week, with the final rounds taking place over a three-day period. The...
Malwarebytes recently disclosed malicious activities belonging to a previously unidentified actor. This unidentified actor has been named as LazyScripter and is active since 2018. What has...
A recent cryptomining botnet campaign has been observed using Bitcoin blockchain transactions to hide its backup C2 IP addresses. It’s a very effective way of staying...
Recently, Unit 42 researchers have come across the most sophisticated, well-engineered, and difficult-to-detect polymorphic malware. About the malware Dubbed BendyBear by experts, the malware is possibly...
Cyberattackers have forced states to take down websites, stolen $36 billion in unemployment payments and exposed millions of residents’ personal information to scammers. COVID-19 made its...
Recent Comments