Cyber Security
The National Institute of Standards and Technology aims to ensure its forthcoming update to the cybersecurity guidance remains a flexible playbook domestic and international...
Hi, what are you looking for?
The National Institute of Standards and Technology aims to ensure its forthcoming update to the cybersecurity guidance remains a flexible playbook domestic and international...
The agency continues its post-quantum cryptography push as it looks to create guidance for all sectors. The latest step in post-quantum cryptography guidance is...
Deputy Attorney General Lisa Monaco noted that success will be seen with a “bias towards action,” rather than just courtroom victories. Federal law enforcement’s...
Threat actors frequently employ malicious Google Ads and SEO poisoning to spread malware. Recently, Secureworks’ Counter Threat Unit (CTU) researchers reported that Cyber attackers are actively...
The Government Accountability Office noted that several major acquisition programs at DHS didn’t think the requirement applied to them. The Department of Homeland Security...
Researchers are seeing a rise in attacks spreading the EvilExtractor data theft tool, used to steal users’ sensitive data in Europe and the U.S....
LockBit ransomware gang targets Macs with its newly-developed encryptors for the first time, making them potentially the first significant ransomware group to aim at...
The Logging Made Easy tool will move to CISA’s GitHub page later this year but will be unsupported in the meantime. The United Kingdom’s...
The management of the government’s IT acquisitions and operations is also on the Government Accountability Office’s biennial high risk list update this year, as...
Recently, Google released an emergency security update to fix another Chrome zero-day vulnerability actively exploited in the wild. This zero-day flaw has been tracked...