Cyber Security
Researchers at the RWTH Aachen University in Germany published a study revealing that tens of thousands of container images hosted on Docker Hub contain...
Hi, what are you looking for?
Researchers at the RWTH Aachen University in Germany published a study revealing that tens of thousands of container images hosted on Docker Hub contain...
China’s Storm-0558 hacked 25 organizations, including government agencies, using fake tokens for email access, aiming at espionage since May 15, 2023. However, Storm-0558’s campaign was blocked...
In today’s age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of this, Endpoints are now...
From a crucial lack of federal funding to longstanding issues with the cyber workforce, experts told Nextgov/FCW that the new cybersecurity implementation plan features...
Officials noted that identity action items could still be included in later iterations of the national cybersecurity strategy implementation plan. The White House’s implementation plan for...
The legislation proposes new requirements for disclosing cyberattacks, assigns guidance for A.I.-enabled cyber, codifies the Federal CISO role and more. A group of House...
A China-based cybercriminal known as Storm-0558 gained access to unclassified U.S. government email accounts using forged authentication tokens according to a report released by...
The plan, released Thursday morning, includes more than 65 “high-impact initiatives” that federal agencies will be tasked with executing to achieve the objectives outlined...
Zoom has released security patches for 6 high and 1 low severity vulnerabilities, allowing threat actors to escalate privileges and disclose sensitive information. The CVSS...
A self-signed China-originated Rootkit acts as a universal downloader targeting gaming sectors to exfiltrate sensitive information. The threat actors abuse Microsoft signing portals to...