Microsoft has now confirmed signing a malicious driver being distributed within gaming environments. This driver, called “Netfilter,” is in fact a rootkit that was observed communicating with Chinese...
Amid an unprecedented series of supply chain shocks to the global economy – including COVID, SolarWinds, the Suez Canal debacle and more – a new international...
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) says the 2020 SolarWinds supply chain cybersecurity compromise could have been prevented with a...
This week, multiple malicious packages were caught in the PyPI repository for Python projects that turned developers’ workstations into cryptomining machines. All malicious packages were published...
Cybercriminals have targeted the Bay Area water supply. Similar to the Oldsmar water treatment attack in Florida, the threat actor used legitimate credentials to break into...
Google and the US National Institute of Standards and Technology (NIST) have unveiled separate proposals to consolidate industry best practices for tackling the burgeoning threat of...
Many adversaries take advantage of new vulnerabilities and convert them into weaponized attacks, while extreme adversaries focus on supply chain and targeted attacks. The work from...
CISOs already have a lot on their plates; putting new vulnerabilities on their own network shouldn’t be in addition. But every day, business units, departments, and...
The Federal Communications Commission is already set to vote on a notice of proposed rulemaking on its equipment authorization program. Congress and the Federal Communications Commission...
The Office of the Chief Information Officer is creating a new contract to help with the IT Modernization Initiative and other major efforts. The FBI’s IT...
Recent Comments