Unfading Sea Haze Attacks: Research Reveals Threat Group

In the ever-evolving landscape of cybersecurity, a new player has emerged onto the scene, named Unfading Sea Haze attacks. This previously undisclosed threat group has garnered attention from researchers due to its ...

CISA Announces Malware Next-Gen Analysis for Public Access

Have you ever downloaded a file and wondered if it’s safe? Now, there’s a powerful new weapon in the fight against malware thanks to the Cybersecurity and Infrastructure Security Agency (CISA). They’ve ...
What government agencies need to know about CISA’s new Binding Operational Directive

What government agencies need to know about CISA’s new Binding Operational Directive

The Cybersecurity and Infrastructure Security Agency (CISA) is reinforcing the nation’s cybersecurity efforts by announcing a new Binding Operational Directive (BOD) related to common vulnerabilities and exposures. Also referred to as CVEs, ...
Security Magazine Article 2_Blog

Thinking Like a Smartphone Eavesdropper

Think of the last time you received a sensitive piece of information. Perhaps it was news of a highly anticipated project at work finally getting the green light, or maybe a not-for-public-consumption ...
GAO report confirms major gaps in government cybersecurity

GAO report confirms major gaps in government cybersecurity

The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others. The original version of this post was published in Forbes. The ...
Click2Gov breaches show the power of zero-days

Click2Gov breaches show the power of zero-days

Patching issues fast is a step toward software security. But as the Click2Gov breaches show, zero-day vulnerabilities resist even the most persistent patchers. The original version of this post was published on ...
President’s ‘cybersecurity moonshot’: Transformational or pie in the sky?

President’s ‘cybersecurity moonshot’: Transformational or pie in the sky?

Making the internet safe and secure in 10 years isn’t going to be easy, if it’s even possible. And that’s why NSTAC’s new proposal is a cyber security moonshot. Stop me if ...
Threats obvious, but electronic voting systems remain insecure

Threats obvious, but electronic voting systems remain insecure

Election security requires that voters trust the results. But many U.S. electronic voting systems are clearly insecure, and untrustworthy. What are we doing about it? The original version of this article was ...
US vows to go on cyber offense

US vows to go on cyber offense

The original version of this article was published in Forbes. We’re all familiar with saber rattling. But this is the digital age. Welcome to the world of cyber rattling. This version of ...
Porous portals, Newegg is a broken egg, and Mirai's creators have new hats | Black Duck

Porous portals, Newegg is a broken egg, and Mirai’s creators have new hats

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Porous payment ...