Tag: News
-
Despite cyberattacks, water security standards remain a pipe dream
It sounds like the start of a bad joke: Digital trespassers from China, Russia, and Iran break into US water …
-
One million US Kaspersky customers to be migrated to this lesser-known alternative
Kaspersky customers in the US can continue their existing subscriptions with a replacement product from the company’s ‘trusted partner’. …
-
Security leaders respond to the White House’s internet routing guide
The White House Office of the National Cyber Director (ONCD) has released a guide to improve the security of the Border Gateway Protocol …
-
New cyber hiring sprint aims to address workforce gap
Ongoing gaps in the U.S. cybersecurity workforce that have left nearly half a million jobs unfilled have prompted the Office of the …
-
Zero-trust adoption almost completed by most federal agencies
Zero-trust implementation has been 87% completed across federal agencies on average ahead of the September 30 deadline, according to …
-
Widespread WordPress site takeovers likely with critical LiteSpeed Cache bug
Exploitation of the flaw, which stems from LiteSpeed Cache’s debug logging functionality, could be conducted by attackers with …
-
Penpie loses over $27M from crypto heist
Immediate withdrawal and deposit takedowns, as well as notifications to the FBI’s Internet Crime Complaint Center and the Singaporean …
-
Now that Qualcomm’s interested, will Apple buy (a little more) Intel?
Qualcomm is allegedly sniffing at the beleaguered remains of Intel and may try to acquire parts of the company. Will Apple make its own …
-
Okta releases how-to guide for tackling admin sprawl: Key takeaways
Paul Wagenseil is a custom content strategist for CyberRisk Alliance, leading creation of content developed from CRA research and aligned …
-
Spyware Vendors’ Nebulous Ecosystem Helps Them Evade Sanctions
“This market is a significant vector for facilitating the human rights harms and national security risks posed more broadly by …
-
Why China views the present situation as a vulnerable moment for the West
Morgan Wright, an internationally recognized expert on cybersecurity strategy, cyberterrorism, national security, and intelligence, serves …
●●●