A report released today dives deep into technical aspects of a Linux backdoor now tracked as Bvp47 that is linked to the Equation Group, the advanced...
The rise of editable Portable Document Files created a new avenue for attackers, but the right configuration can protect most systems without compromising functionality, NSA says....
The Cybersecurity and Infrastructure Security Agency order comes as a prominent firm says nation states are exploiting the vulnerabilities. Federal agencies have until 5 pm on...
The agencies got specific about who is responsible for what in a four-part series on securing the inherently cloud-based environments. Federal cybersecurity agencies addressed original equipment...
Enduring Security Framework (ESF) experts from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) published their third installment of guidance to protect the confidentiality,...
The document is the third in a four-part series of guidance that categorizes security responsibilities according to their relevance for the cloud service providers, mobile operators...
As part of the Enduring Security Framework (ESF), the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) published guidance to mitigate cyber...
The tech can provide evidence of compliance with configuration standards and detect anomalies in complex multi-tenant, multi-cloud computing architectures. Cloud service providers and mobile operating networks...
Fifth-generation networking is expected to multiply opportunities for hackers using tactics already observed in attacks like the one against IT management firm SolarWinds. Key federal agencies...
A joint statement from the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Agency (CISA), the Environmental Protection Agency (EPA) and the National Security Agency...
Recent Comments