Cyber Security
Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers. In this article we...
Hi, what are you looking for?
Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers. In this article we...
Key U.S. allies supported the effort but did not sign on to a joint statement committing to the creation of a code of conduct...
Officials in the public and private sectors warned of the need to enact a robust cybersecurity posture at the federal level ahead of growing...
Cloud sprawl happens when development teams spin up new cloud resources, forget about them, then move on to the next urgent task. Migrating to...
The watchdog made several recommendations in an audit of the Cybersecurity Maturity Model Certification effort. The Defense Department needs to improve communication with industry...
Security researchers can now test payloads against the OWASP ModSecurity Core Rule Set with a new sandbox released by the project maintainers. The Core...
North American food importer Atalanta has admitted that it suffered a data breach involving employees’ personal information as the result of a ransomware attack. In a statement issued...
The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization...
Taking a proactive approach is a critical step in improving the way the government combats threats. One in three cyber incidents strike the public...
The new Federal Information Security Modernization Act guidance also prioritizes security testing and doubles down on CISA’s Continuous Diagnostics and Mitigation program. The Office...