US Government Expands Role in Software Security
The White House Office of the National Cyber Director puts software developers on notice, calling for a move to memory-safe…
The White House Office of the National Cyber Director puts software developers on notice, calling for a move to memory-safe…
Russian APT28 military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory issued…
National security adviser Jake Sullivan said a Senate-approved bill for more Ukraine aid would address concerns of a critical U.S.…
By Kevin Kelly, CEO and Chairman, Arcfield As the role of satellite communication systems in geopolitical conflicts and critical infrastructure…
Despite ransomware losses remaining high, privacy violations have quickly risen to second in a list of expected cyber insurance claims…
Microsoft has expanded free Purview Audit logging capabilities for all U.S. federal agencies six months after disclosing that Chinese hackers…
Users have already downloaded droppers for the malware from Google's official Play store more than 100,000 times since last November.
U.S. and U.K. authorities have seized the darknet websites run by LockBit, a prolific and destructive ransomware group that has…
The purveyor of the infamous Pegasus mobile spyware now has a new method for obtaining critical information from target iPhones…
TAG-70's sophisticated espionage campaign targeted a range of geopolitical targets, suggesting a highly capable and well-funded state-backed threat actor.