Sen. Gary Peters, D-Mich., speaks during a Senate Homeland Security and Governmental Affairs Committee hearing on March 25, 2021 on Capitol Hill in Washington, D.C. (Photo by Astrid Riecken/Getty Images) Bipartisan Senate bill targets supply chain threats from foreign adversaries The bill would strengthen oversight powers for the body charged with investigating IT products from China and other foes. 4 days ago By Matt Bracken
Shakhtar Donetsk’s Ukrainian midfielder #10 Georgiy Sudakov (C) vies for the ball during the UEFA Champions League football match FC Shakhtar Donetsk vs BSC Young Boys in Gelsenkirchen, western Germany, on November 6, 2024. Hackers were recently found to be exploiting Jupyter notebooks to host illegal streams of this particular Champions League game. (Photo by INA FASSBENDER/AFP via Getty Images) Attackers are hijacking Jupyter notebooks to host illegal Champions League streams Normally reserved for data analysis, a cybersecurity firm caught online content pirates hosting soccer matches. 5 days ago By Christian Vasquez
Palo Alto Networks headquarters in Silicon Valley; Palo Alto Networks, Inc. is an American multinational cyber security company. (Getty Images) More bugs in Palo Alto Expedition see active exploitation, CISA warns Hackers have been actively targeting the firewall management software through multiple vulnerabilities. Nov 15, 2024 By Christian Vasquez
Safe Mode Securing the Skies: Aerospace Cybersecurity with David Brumley David Brumley, Cybersecurity Professor at Carnegie Mellon & CEO of Mayhem Security; Danny Jenkins, Co-Founder & CEO of ThreatLocker Nov 14, 2024 By CyberScoop Staff
Telecommunication tower during sunset. (Getty Images) Moody’s Rating adds telecoms, airlines, utilities to highest risk category The financial ratings service says industry digital reliance increases cyber risk. Nov 12, 2024 By Christian Vasquez
N. Korean hacker silhouette with North Korean Flag. (Getty Images) North Korean-linked hackers were caught experimenting with new macOS malware Researchers can’t tell if the malware was used in a campaign, or North Korean operatives were caught before they could deploy it in the wild. Nov 12, 2024 By Christian Vasquez
Members of the U.S. House of Representatives leave the U.S. Capitol after a series of votes on Sept. 25. (Photo by Anna Moneymaker/Getty Images) Host of House panels getting briefed on major Chinese hacker telecom breaches The reported scope of the Salt Typhoon hacks has expanded in recent days and weeks, from the incoming president to top U.S. officials. Nov 7, 2024 By Tim Starks
A hacker with China’s national flag in background. (Getty Images) China’s elite hackers expand target list to European Union Beijing's hackers are also using an open-source VPN tool for persistence. Nov 7, 2024 By Christian Vasquez
Facade of the headquarters building of Schneider Electric, a French multinational company specializing in digital automation and energy managementl (Getty Images) Schneider Electric reports cyberattack, its third incident in 18 months The ransomware group HellCat claims responsibility for the cyberattack and threatens to dump 40GB. Nov 5, 2024 By Christian Vasquez
Screen of smartphone with icons. (Getty Images) Android warns of Qualcomm exploit in latest security bulletin The November security bulletin includes two CVE's reportedly exploited in the wild. Nov 4, 2024 By Christian Vasquez