Overtaxed State CISOs Struggle With Budgeting, Staffing
CISOs for US states face the same kinds of challenges those at private companies do: lots of work to handle,…
CISOs for US states face the same kinds of challenges those at private companies do: lots of work to handle,…
A new version of the Necro malware loader for Android was installed on 11 million devices through Google Play in…
The FOCAL plan outlines baselines to synchronize cybersecurity priorities and policies across, as well as within, agencies.
A North Korean advanced persistent threat (APT) actor (aka Gleaming Pisces) tried to sneak simple backdoors into public software packages.
The Federal Communications Commission (FCC) has reached a $13 million settlement with AT&T to resolve a probe into whether the…
Business intelligence firm Gartner labels security orchestration, automation, and response as "obsolete," but the fight to automate and simplify security…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several…
A novel side-channel attack dubbed "RAMBO" (Radiation of Air-gapped Memory Bus for Offense) generates electromagnetic radiation from a device's RAM to…
Vendors of mercenary spyware tools used by nation-states to track citizens and enemies have gotten savvy about evading efforts to…
Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.