By seeking reliable, governable, traceable technology, the Defense Department could help set global standards for using artificial intelligence.
Latest from the SECDEF PCA
Some description here....
A New York tech company made millions by selling Chinese-made equipment to the U.S. military that it falsely claimed were built in the U.S., the Justice Department charged Thursday.
A clever spam campaign is underway that pretends to be a WebEx meeting invite and uses a Cisco open redirect that pushes a Remote Access Trojan to the recipient. Using open redirects add legitimacy to spam URLs and increases the chances that victims will click on an URL.
It has been almost six months since an eye opening vulnerability in Microsoft Windows RDP CVE 2019-0708, dubbed BlueKeep, was patched. Today, Security Researcher Kevin Beaumont posted a Twitter thread reporting BSODs (Blue Screen of Death) across his network of BlueKeep Honeypots.
Users of Amazon Ring doorbell were found to be in danger of having their home internet invaded by hackers, as the doorbell comes with a serious security flaw.
All six major browser vendors have plans to support DNS-over-HTTPS (or DoH), a protocol that encrypts DNS traffic and helps improve a user's privacy on the web.
Attackers are always looking for new tricks to distribute malware without them being detected by antivirus scanners and secure email gateways. This was illustrated in a new phishing campaign that utilized a specially crafted ZIP file that was designed to bypass secure email gateways to distribute the NanoCore RAT.
Crowdsourced security company Bugcrowd announced today that it paid over $500K ($513,333) to 237 whitehat hackers in a single week for the first time since launching its bug bounty platform more than seven years ago.
This webinar will cover the Information Analysis Center program and the capabilities and mission of the Homeland Defense and Security Information Analysis Center. It will include an overview of Information Analysis Center activities, core functions, research and analysis capabilities, and a description of the services and products produced by the Homeland
The term cyber has been so broadly applied as to encompass virtually everything in the electronic domain. This webinar captures a consolidated DoD view on Cyber, delineates the layers of cyberspace, the implications of product and infrastructure focused cyber, introduces layered cybersecurity and begins to consider what is new and what we already know to