Nextgov looks back at the Trump administration’s major IT policy moves that will have lasting effects on federal technology for the foreseeable future. Technology and tech...
The delayed third edition of the US Department of Defense’s ‘Hack the Army’ bug bounty program is due to take place next month. Hack the Army 3.0 –...
NetGalley – a website that gives book reviewers pre-release access to new titles – has warned users about a data breach that may have exposed their passwords and...
TeamTNT, the cybercriminal group primarily known for its cryptomining operations, has upgraded its arsenal with new tools with sharpened capabilities. In a recent attack, the group has...
Gitpaste-12, the worm that propagates via GitHub and uses GitHub and Pastebin to host malicious payload, is active again with new exploits. Earlier, the worm was found exploiting...
A second supply-chain attack dubbed Operation SignSight has been discovered on the website of the Vietnam Government Certification Authority. The attackers made changes to software installers available for...
Introduction Recently, it was reported that a nation-state threat-actor managed to infiltrate a large number of organizations—including multiple US government agencies. They did this by distributing...
Someone tried to use popular Google Chrome Extensions for secretly playing videos in users’ browsers to inflate view counts. Yesterday morning, our solutions started giving many...
SolarWinds has released an updated advisory for the additional SuperNova malware discovered to have been distributed through the company’s network management platform. Earlier this month, it...
Emotet, the nefarious banking trojan that evolved into a downloader, is active again just days before Christmas. The attackers are already known for using various local...
Recent Comments