Cyber Security
Identity access management provider SecureAuth has uncovered a security vulnerability in SAP HANA, SAP’s in-memory database. HANA is a core component of SAP’s business...
Hi, what are you looking for?
Identity access management provider SecureAuth has uncovered a security vulnerability in SAP HANA, SAP’s in-memory database. HANA is a core component of SAP’s business...
The FBI should establish a “formalized bureau-wide dark web strategy” to address operational shortcomings in how it tackles illegal darknet activities, a Department of...
FILE – This June 6, 2013 file photo, shows the sign outside the National Security Agency (NSA) campus in Fort Meade, Md.All fingers are...
Attackers can bypass password checks in applications that use Bouncy Castle’s OpenBSDBcrypt class because of recently discovered cryptographic mistakes in the widely used encryption library. The authentication bypass vulnerability (CVE-2020-28052)...
A team of security researchers has developed a DIY appliance to detect stalkerware and other malware on smartphones. TinyCheck is open source software designed...
FILE – In this Nov. 13, 2014, file photo Vice President Joe Biden, with Ebola Response Coordinator Ron Klain, left, and White House Senior...
Europol and the European Commission have launched a new decryption platform that will help boost Europol’s ability to gain access to information stored in encrypted...
Threat actors continue to trade critical medical data in the Dark Web while organizations are involved in the response to the COVID-19 pandemic. Cybercrime organizations continue to be very...
Surrounded by Army cadets, President Donald Trump watches the first half of the 121st Army-Navy Football Game in Michie Stadium at the United States...
As the government scrambles to understand the widening compromise, legislation to shore up the nation’s cyber defenses sits unsigned on the President’s desk. As...