Identities must be securely created and protected, continuously validated, limited by zero trust principles, and continuously ...
President Joe Biden issued an executive order aimed at strengthening cybersecurity and making it easier to go after hacking ...
Hackers have leaked 15,000 Fortinet firewall configurations, which were apparently obtained as a result of exploitation of ...
In 2024 organizations informed the US government about 585 healthcare data breaches affecting a total of nearly 180 million ...
Donald Trump created CISA during his first administration, and has not yet nominated a replacement for CISA Director Jen ...
Law enforcement turns the PlugX malware’s own self-delete mechanism against it, nuking the China-linked trojan from thousands ...
Trevin Edgeworth is the Red Team Practice Director at Bishop Fox, where he focuses on building and leading adversary ...
DORA requires EU financial institutions to test and show compliance with rules for cybersecurity risk-management, incident ...
Open source software (OSS) is a prime target for supply chain cyberattacks and protecting it remains a major challenge.
A vulnerability in Google’s OAuth implementation allows takeover of old employee accounts when domain ownership changes.
Google has released Chrome 132 with fixes for 16 vulnerabilities, including multiple high-severity security defects.
Nvidia, Zoom, and Zyxel have released patches for multiple high-severity vulnerabilities across their products.