Explainer: What does the UK’s Integrated Review mean for cybersecurity?
Stephen Pritchard sheds light on the government’s new defense strategy [...]
Stephen Pritchard sheds light on the government’s new defense strategy [...]
Two vulnerabilities could be chained to lead to server-side request forgery [...]
Space industry can no longer rely on ‘security through obscurity’, Cysat ’21 delegates hear [...]
Owners of manga fan site are rebuilding the codebase following series of security incidents [...]
The vulnerability was found in GitHub’s pull request mechanism [...]
Universal Relay devices are used to simplify power management in critical infrastructure assets [...]
Issue resulted in some users gaining access to other users’ sessions [...]
Esoteric hacking risk addressed through recent update [...]
Six winning write-ups ranged from identity management issues and privilege escalation to ‘full blown RCE’ [...]
US sentence and a heavy fine for criminal hacker who targeted multiple organizations [...]
Cybersecurity staff are being asked to conduct more pen tests – but this still might not be enough [...]
Teams, Exchange Online, and other services were knocked offline for more than 14 hours [...]
Third-party report finds ‘no evidence’ that security firm’s source code was modified [...]
Browser-maker urges web developers to take action against vulnerability that continues to haunt the industry [...]
Prime Minister says the new National Cyber Force will have its headquarters in the north of England [...]
XSS security flaw has already been patched in Google Chrome and Mozilla Firefox [...]
Cyber-attack compromises delivery data [...]
Infosec ‘slow-pocalypse’ sees surge in ransomware and online fraud [...]
CVE assigned due to potential for harm even though some social engineering trickery is required [...]
Project maintainers reportedly declined to fix flaws due to limited attack scenarios [...]
Users can search or browse any links that have been shortened from a specific domain [...]
Bill would enact a unified federal law governing the use of citizens’ personal information [...]
Optional whitespaces were ‘a recurring source of vulnerabilities’ in regex implementations [...]
Sigstore: a Let’s Encrypt for software integrity [...]
Successful data breach class action litigation may soon depend on the location where the lawsuit is filed [...]