The National Security Agency, Cybersecurity and Infrastructure Security Agency, the FBI and international partners have released a report on a mobile malware, dubbed Infamous Chisel, associated with a group of Russian military
MoreThe National Institute of Standards and Technology has opened for public comment a new draft report outlining strategies for integrating software supply chain security in DevSecOps continuous integration/continuous delivery pipelines. The draft
MoreThe National Institute of Standards and Technology is seeking public feedback on a draft publication focused on creating a training program for cybersecurity and privacy. The draft, entitled “Building a Cybersecurity and
MoreThe FBI and its partners in France, Germany, Romania, Latvia, the U.K. and the Netherlands dismantled a botnet infrastructure, dubbed Qakbot, that cybercriminals used to perform financial fraud, ransomware and various criminal
MoreThe Cybersecurity and Infrastructure Security Agency has released the first annual report on the progress of its Vulnerability Disclosure Policy platform. The report showed that since its inception in 2021, the VDP
MoreRep. Nancy Mace, R-S.C., has introduced a bill that would direct the Office of Management and Budget to update the Federal Acquisition Regulation to require federal contractors to implement vulnerability disclosure policies,
MoreMITRE plans to expand its International Cyber Capacity Building and Active Defense Capability Set programs to help strengthen U.S. and allied cyber defense. ICCB will add 28 countries to its partner network
MoreThe National Institute of Standards and Technology’s new draft report examining how cybersecurity and privacy content sources relate to each other has been opened for public comment. The NIST Internal Report 8477
MorePatrick Dedham, deputy to the commanding general to the U.S. Army’s Network Enterprise Technology Command, said NETCOM is overseeing continuous improvement projects for the service branch to achieve a zero trust network.
MoreThe Cybersecurity and Infrastructure Security Agency has published a cyber defense plan to help organizations respond to threats against remote monitoring and management software. The RMM Cyber Defense Plan was developed by
More