Senate Approves Bill Banning TikTok From US Government Devices
The bill still needs to receive approval from the US House of Representatives
Cyber News, Cyber Threat TrendsThe bill still needs to receive approval from the US House of Representatives
Cyber News, Cyber Threat TrendsMean time to resolve (MTTR) isn’t a viable metric for measuring the reliability or security of complex software systems and should be replaced by other, more trustworthy options. That’s according to a new report from Verica which argued that the use of MTTR to gauge software network failures and outages is not appropriate, partly due […]
Cyber News, Cyber Threat TrendsThis year, various ransomware-as-a-service groups have developed versions of their ransomware in Rust, including Agenda. Agenda’s Rust variant has targeted vital industries like its Go counterpart. In this blog, we will discuss how the Rust variant works.
Cyber News, Cyber Threat TrendsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities impacting Veeam Backup & Replication software to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation in the wild. The now-patched critical flaws, tracked as CVE-2022-26500 and CVE-2022-26501, are both rated 9.8 on the CVSS scoring system, and could be leveraged to
Cyber News, Cyber Threat TrendsMicrosoft on Thursday flagged a cross-platform botnet that’s primarily designed to launch distributed denial-of-service (DDoS) attacks against private Minecraft servers. Called MCCrash, the botnet is characterized by a unique spreading mechanism that allows it to propagate to Linux-based devices despite originating from malicious software downloads on Windows hosts. “The botnet spreads by
Cyber News, Cyber Threat TrendsThe U.S. National Institute of Standards and Technology (NIST), an agency within the Department of Commerce, announced Thursday that it’s formally retiring the SHA-1 cryptographic algorithm. SHA-1, short for Secure Hash Algorithm 1, is a 27-year-old hash function used in cryptography and has since been deemed broken owing to the risk of collision attacks. While hashes are designed to be
Cyber News, Cyber Threat TrendsThe bill still needs to receive approval from the US House of Representatives
Cyber News, Cyber Threat TrendsThe bill still needs to receive approval from the US House of Representatives
Cyber News, Cyber Threat TrendsThe bill still needs to receive approval from the US House of Representatives
Cyber News, Cyber Threat Trends