Cyber Security
Attackers who exploit critical security vulnerabilities in Swisslog’s TransLogic Pneumatic Tube System (PTS) could potentially reroute or shut down the automated delivery of medications and other...
Hi, what are you looking for?
Attackers who exploit critical security vulnerabilities in Swisslog’s TransLogic Pneumatic Tube System (PTS) could potentially reroute or shut down the automated delivery of medications and other...
Encryption algorithms found in a decryptor show that the notorious DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation and is actively...
A researcher has created a remote print server allowing any Windows user with limited privileges to gain complete control over a device simply by...
A new ransomware gang named BlackMatter is purchasing access to corporate networks while claiming to include the best features from the notorious and now-defunct...
The FBI Criminal Investigative Division and Securities and Exchange Commission warn investors of fraudsters impersonating registered investment professionals such as investment advisers and registered...
FILE – This May 4, 2021 file photo shows a sign outside the Robert F. Kennedy Department of Justice building in Washington. The Russian...
Even when some agencies succeed at bringing talent in, they aren’t able to hold on to it for long. Congress should increase its oversight...
INTERVIEW Aaron Portnoy confesses to periodic bouts of imposter syndrome, despite having carved out a distinguished career in offensive security. Among other things, Portnoy – now...
The single largest risk factor reported by respondents is the influx in remote work. Three in four public sector technology practitioners flag remote work...
In a joint advisory, international cybersecurity officials say failure to patch years-old vulnerabilities makes attributing cyberattacks more difficult. The top 30 vulnerabilities routinely exploited...