New Bill Proposes NSA Surveillance Reforms
The newly-introduced bill targets the Patriot Act’s Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.
The newly-introduced bill targets the Patriot Act’s Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Image credit: Times of Israel. Aleksei Burkov, a 29-year-old Russian hacker, on Thursday pleaded guilty to multiple criminal charges for running two illegal websites that helped cyber criminals commit more than $20 million in credit card fraud. The first website Burkov operated was an online marketplace for buying and selling stolen credit card and debit…
The malware uses thousands of partner websites to spread malvertising code.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The malicious email campaign included a never-before-seen malware downloader called Carrotball, and may be linked to the Konni Group APT.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The Feds have warned on six vulnerabilities in GE medical equipment that could affect patient monitor alarms and more.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
New research outlines vulnerabilities in Safari’s Intelligent Tracking Protection that can reveal user browsing behavior to third parties.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The competition targets the systems that run critical infrastructure and more.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
What are the key considerations security decision-makers should take into account when designing their 2020 breach protection? To answer this, we polled 1,536 cybersecurity professionals in The State of Breach Protection 2020 survey (Download the full survey here) to understand the common practices, prioritization, and preferences of the organization today in protecting themselves from breaches.…