Technology

Cut CISA and Everyone Pays for It

Gutting CISA won't just lose us a partner. It will lose us momentum. And in this...

SANS Top 5: Cyber Has Busted Out of the SOC

This year's top cyber challenges include cloud authorization sprawl, ICS cyberat...

Enterprises Need to Beware of These 5 Threats

A panelist of SANS Institute leaders detailed current threats and provided actio...

Experts Debate Real ID Security Ahead of May 7 Deadline

Real IDs have been in the works since 2005. Are their security standards still r...

Getting Outlook.com Ready for Bulk Email Compliance

Microsoft has set May 5 as the deadline for bulk email compliance. In this Tech ...

A Cybersecurity Paradox: Even Resilient Organizations A...

Organizations are underestimating the advanced technology's risks to the softwar...

When Threat Actors Behave Like Managed Service Providers

How one unreasonable client got lucky during a cyber incident, despite their unr...

Microsoft Readies Administrator Protection Option for W...

Microsoft's David Weston describes the new feature as the most significant archi...

Putin's Cyberattacks on Ukraine Rise 70%, With Little E...

Russia's cyberattacks on Ukraine have increased dramatically, targeting the coun...

Billbug Expands Cyber-Espionage Campaign in Southeast Asia

The China-linked cyber-operations group, better known as Lotus Panda, uses its o...

Cisco Boosts XDR Platform, Splunk With Agentic AI

Cisco joins the agentic AI wave with the introduction of advanced LLMs to autono...

Prolific RansomHub Operation Goes Dark

The chat infrastructure and data-leak site of the notorious ransomware-as-a-serv...

Former CISA Head Slams Trump Admin Over 'Loyalty Mandate'

Jen Easterly, former director of CISA, discussed the first 100 days of the secon...

Adversaries Are Toying With US Networks & DC Is Sho...

While nation-state actors are demonstrating how easily they can infiltrate US ne...

TheWizards APT Casts a Spell on Asian Gamblers With Nov...

A SLAAC-spoofing, adversary-in-the-middle campaign is hiding the WizardNet backd...

Debunking Security 'Myths' to Address Common Gaps

Dan Gorecki and Scott Brammer's interactive session during RSAC Conference 2025 ...

Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe

A Minnesota cybersecurity and computer forensics expert whose testimony has feat...

China-based SMS Phishing Triad Pivots to Banks

China-based purveyors of SMS phishing kits are enjoying remarkable success conve...

Patch Tuesday, April 2025 Edition

Microsoft today released updates to plug at least 121 security holes in its Wind...

Funding Expires for Key Cyber Vulnerability Database

A critical resource that cybersecurity professionals worldwide rely on to identi...

Trump Revenge Tour Targets Cyber Leaders, Elections

President Trump last week revoked security clearances for Chris Krebs, the forme...

DOGE Worker’s Code Supports NLRB Whistleblower

A whistleblower at the National Labor Relations Board (NLRB) alleged last week t...

Whistleblower: DOGE Siphoned NLRB Case Data

A security architect with the National Labor Relations Board (NLRB) alleges that...

Alleged ‘Scattered Spider’ Member Extradited to U.S.

A 23-year-old Scottish man thought to be a member of the prolific Scattered Spid...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.