Critical Networks Within National Security Systems Should Implement Zero TrustThe US National Security Agency has issued its zero trust guidance aimed at securing critical networks and sensitive […]
Critical Networks Within National Security Systems Should Implement Zero TrustThe US National Security Agency has issued its zero trust guidance aimed at securing critical networks and sensitive […]
Lawmakers and Witnesses See Expanded Role for CISA Following AttackA pair of U.S. House committees held their first public hearings into the SolarWinds attack, with lawmakers and […]
Truveta Initiative Involves Sharing De-Identified Data From 14 Provider OrganizationsTruveta, a new big data collaborative research effort involving 14 U.S. healthcare providers, will share de-identified data on […]
CISA May Launch Other Grants as WellThe U.S. Department of Homeland Security will provide an additional $25 million in grants to state and local cybersecurity preparedness programs […]
The Flaw in Windows Graphics Component Can Enable Web-Based AttacksMicrosoft has patched a critical vulnerability in Windows that can be exploited by tricking users to visit websites […]
Campaign Targets Tibetan OrganizationsProofpoint reports that Chinese state-sponsored hackers are using a new customized malicious Mozilla Firefox browser extension that facilitates access and control of victims’ Gmail […]
Others Now Can Use CodeQL Queries Available in GitHub RepositoryMicrosoft is making available the CodeQL queries it used to detect malicious implants in the massive supply chain […]
Use Threat Hunting to Better Spot Attacks in Progress, Security Experts RecommendRansomware continues to sting numerous organizations, and the problem only seems to be getting worse. More […]
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry. […]
Researchers have uncovered gaps in Amazon’s skill vetting process for the Alexa voice assistant ecosystem that could allow a malicious actor to publish a deceptive skill under […]
Feel free to contact us. We are happy to assist you creating your digital vision.
Recent Comments