Cyber Security
The network guidance document is years in the making. The Cybersecurity and Infrastructure Security Agency on Thursday published guidance meant to provide federal agencies with security...
Hi, what are you looking for?
The network guidance document is years in the making. The Cybersecurity and Infrastructure Security Agency on Thursday published guidance meant to provide federal agencies with security...
The European Commission (EC) has launched a bug bounty program for open source projects that underpin its public services. Bug bounty hunters will be offered up...
An emergency directive from the Transportation Security Administration following the Colonial Pipeline attack faced opposition from Senate Republicans after the industry complained they weren’t...
President Biden has granted the National Security Agency (NSA) new powers to bolster the cybersecurity of US federal government computer systems related to national...
Tighter controls have been introduced to resolve a weakness in GitHub Actions that made it possible to circumvent code review safeguards. Omer Gil and...
Vulnerabilities in CMS platform Umbraco could allow an attacker to takeover a user’s account, researchers warn. Umbraco is a free and popular open source content management...
Comments an association of industry giants made on a notice of proposed rulemaking from the Commerce Department come amid multiple government efforts to reduce...
Chrome is deprecating direct access to private network endpoints from public websites in order to protect users from cross-site request forgery (CSRF) attacks. Part two of...
A vulnerability affecting the Safari browser can leak a user’s identity and their website history, researchers have warned. The issue was introduced in Safari’s...
A White House summit focused on open source security has emphasized the need for greater collaboration between tech giants, open source volunteers, and the...