China and Russia are developing lasers and a host of other anti-satellite weapons, according to a new Defense Intelligence Agency report that fleshes out concerns that Pentagon leaders have been highlighting for years.
CS Digest Section: RECENT HEADLINES
Congress has a new rising target when it comes to cyber: The Pentagon. The U.S. military last year was given the green light to start offensive cyber operations against foreign adversaries, an area that one new Democratic subcommittee chair says he will keep a close eye on in the coming months.
Federal agencies possess the right combination of knowledge, capabilities and technologies to allow for the creation of a strong cyber defense system that is the gold standard for the world. We have the chance to create successful cybersecurity programs that can be used both across the government and by industry. Like Armstrong, we can plant a flag that
Nearly all of the 101 data privacy violations investigated in the last 10 years ended in settlement agreements, with no penalties.
A Windows application was recently observed packing the ability to run on Macs and download and install malware on the target systems.
A sweeping executive order to be signed Monday will push agencies to boost funding, improve training, and propose regulations for AI-related efforts.
Ransomware distributors have started to target managed service providers (MSPs) in order to mass-infect all of their clients in a single attack. Recent reports indicate that multiple MSPs have been hacked recently, which has led to hundreds, if not thousands, of clients being infected with the GandCrab Ransomware.
We often hear about sextortion, business email compromise (BEC), and inheritance scams, but the often overlooked "Romance Scams" could be the most insidious of them all. Not only do victims lose money, but the emotional entanglement ultimately leads to heartbreak.
The U.S. government - along with a number of leading security companies - recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that attack went
Proof-of-concept (PoC) code is now publicly available for a recently disclosed container escape vulnerability impacting popular cloud platforms, including AWS, Google Cloud, and numerous Linux distributions.