Cyber Security
Acer has fixed a high-severity vulnerability affecting multiple laptop models that could enable local attackers to deactivate UEFI Secure Boot on targeted systems. The...
Hi, what are you looking for?
Acer has fixed a high-severity vulnerability affecting multiple laptop models that could enable local attackers to deactivate UEFI Secure Boot on targeted systems. The...
Inspectors general from Commerce and Treasury present a tale of two testing regimes. In separate reports, agency watchdogs demonstrated the difference proper implementation of...
New ransomware attacks targeting organizations in Ukraine first detected this Monday have been linked to the notorious Russian military threat group Sandworm. Slovak software...
The Ragnar Locker ransomware gang has published stolen data from what they thought was the municipality of Zwijndrecht, but turned out to be stolen from Zwijndrecht...
A cross-site scripting (XSS) vulnerability in ConnectWise Control, the remote monitoring and management (RMM) platform, offered attackers a powerful attack vector for abusing remote access tools....
A vulnerability in Amazon Web Services (AWS) AppSync enabled unauthorized cross-account access to AWS resources, according to the findings of security researchers. AppSync is...
Amid a recent wave of layoffs across the technology sector, the VA is working to position itself as an enticing destination for unemployed tech...
Defense agencies are to implement zero-trust standards by 2027. Defense agencies have until 2027 to convert their networks to architectures that continually check to...
The Information Technology Industry Council asked OMB to clarify a memorandum that was creating challenges for software producers. The Information Technology Industry Council, or...
Multiple instances of social media platform Mastodon are vulnerable to system configuration issues, security researcher Lenin Alevski warns. The exodus of former Twitter users in response...