To shore up its cyber defenses, State is identifying potential vulnerabilities across its many disparate systems and working to boost its use of multifactor authentication. The...
HAProxy, the popular open source load balancer and reverse proxy, has patched a bug that could enable attackers to stage HTTP request smuggling attacks. By sending a maliciously crafted HTTP...
Scandinavian Airlines (SAS) has posted a notice warning passengers that a recent multi-hour outage of its website and mobile app was caused by a cyberattack that...
A new malware dubbed ‘ProxyShellMiner’ exploits the Microsoft Exchange ProxyShell vulnerabilities to deploy cryptocurrency miners throughout a Windows domain to generate profit for the attackers. ProxyShell...
Defense’s updated plan focuses on role-specific requirements and comes as the agency’s cyber workforce strategy is slated for imminent release. The Defense Department’s Chief Information Officer,...
A new Mirai botnet variant tracked as ‘V3G4’ targets 13 vulnerabilities in Linux-based servers and IoT devices to use in DDoS (distributed denial of service) attacks....
An Office of the National Cyber Director official discussed the path of transitioning public and private networks to post-quantum cryptographic standards, and emphasizes data inventory in...
Want to get the latest web security news straight to your inbox? Now you can, with the upcoming launch of The Daily Swig’s first ever newsletter. We’re...
A hacker is using fake code-signing certificates impersonating cybersecurity firm Emsisoft to target customers using its security products, hoping to bypass their defenses. Code signing certificates...
The Defense Department’s inspector general found that unsanctioned apps downloaded onto government-issued mobile devices “could pose operational and cybersecurity risks to DOD information and information systems.”...
Recent Comments