Cyber Director Highlights Challenges in Federal Network Security
Federal agencies face numerous cyberattacks hindering defense advancements. Adoption of RPKI aims to secure essential BGP routing. Ongoing challenges highlight…
Hackers Expose 15,000+ Cloud Credentials via AWS S3 Bucket
Over 15,000 cloud credentials were exposed in an AWS bucket. EMERALDWHALE targeted git configurations to steal sensitive data. Organizations must…
Russian Developer Charged in International Malware Crackdown
Russian developer charged for creating RedLine malware. International operation led to seizure of malware infrastructure. Conviction could result in up…
Senator Markey Urges Meta to Continue Election Research Partnerships
Senator Markey urges Meta to maintain research partnerships for election integrity. Concerns rise over Meta's reduced content moderation and transparency…
Hospitals and Insurers Struggle Against Rising Cyberattacks
Healthcare cyberattacks are increasing rapidly in 2023. Major breaches disrupt patient care and expose sensitive data. Collaboration and robust security…
CISA Advances Secure Software Practices with New Initiative
CISA launches new initiative targeting risky software practices. Over 230 manufacturers committed to secure-by-design goals. Consumers benefit from enhanced security…
International Authorities Disrupt RedLine and Meta Infostealers
International authorities disrupted RedLine and Meta infostealers. They gained full access to the criminals' backend infrastructure. Operation highlights enhanced global…
US Investigates Chinese Cyberattacks on Telecoms and Campaigns
Chinese hackers allegedly accessed US telecoms targeting political candidates. Salt Typhoon group linked to the cyberattacks. Federal authorities and Congress…
Change Healthcare Reports Largest U.S. Health Data Breach
Change Healthcare experienced a data breach affecting 100 million Americans. The incident resulted in over $1 billion in losses and…
Qilin B Ransomware Update Evades Detection, Experts Warn
Qilin.B introduces advanced encryption and obfuscation techniques. It poses increased risks by disabling backups and evading detection. Organizations must enhance…