Leaky Cybersecurity Holes Put Water Systems at Risk
At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks…
At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks…
Secure by Demand offers a starting point for third-party risk management teams, but they need to take the essential step…
Earlier this week, I wrote a column exposing the cancer metastasizing within America’s body politic — a malignancy created and…
The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity…
Oracle has fixed an unauthenticated file disclosure flaw in Oracle Agile Product Lifecycle Management (PLM) tracked as CVE-2024-21287, which was actively…
The popularity of cryptocurrencies like Ethereum and Bitcoin surged during the pandemic era. What began as a niche, almost novelty…
Security challenges in the healthcare sector continue to grow as connected assets and attack surfaces expand. Organizations in any sector…
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure…
On Friday, the U.S. Federal Trade Commission (FTC) reported that the number of consumer complaints about unwanted telemarketing phone calls…
A new report from the Open Software Supply Chain Attack Reference (OSC&R) team provides a framework to reduce how much…