News

The CISA has identified and reported 3 zero-day vulnerabilities, and one of them could be a big problem for Chrome users.
Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access ...
Secure by Design is a major CISA effort to have software prioritize security as a core requirement, rather than as a ...
A multi-agency cybersecurity advisory warns about unsophisticated hackers compromising U.S. critical infrastructure using ...
A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, ...
CISA warned U.S. federal agencies to secure their systems against ongoing attacks exploiting a high-severity vulnerability in ...
BianLian and RansomExx Exploit SAP CVE-2025-31324 for Full Access, Deploy PipeMagic and Brute Ratel in Multi-Nation Attacks.
The CRA highlights security measures required for manufacturers of digital products, including securing an entire software ...
Read about Garfield Jones’ remarks on CISA's efforts to advance the adoption of post-quantum cryptographic standards in ...
According to a court filing last week, the U.S. Department of Homeland Security has terminated a $2.4 billion IT and cybersecurity contract awarded to Reston-based federal contractor Leidos last year.
Miller called on Congress to deliver a clean extension of CISA 15 ahead of its sunset date in September to ensure continuity and avoid disruptions at the federal, state, and local levels that would ...