CISA Director Jen Easterly says the Log4j flaw likely affects hundreds of millions of devices and may be the most serious bug she has seen in her career
A vulnerability in a widely used Apache library … Ncsc-Nl / GitHub : Log4j overview related software Kyle Alspach / VentureBeat : Log4j exploits attempted on 44% of corporate networks; ransomware payl...
DHS issues an interim rule that will, once finalized, let it hire cybersecurity professionals at salaries of up to $255,800 and up to $332,100 in special cases
and Retain—Cybersecurity Talent Maggie Miller / The Hill : DHS announces new program to attract and retain cybersecurity talent Natalie Alms / Federal Computer Week : New cyber talent system, years in...
Researchers find 1,000+ web apps, from Ford, American Airlines, and others, mistakenly exposed 38M records stored on Microsoft's Power Apps service
Including Contact-Tracing Info Keumars Afifi-Sabet / IT PRO : Microsoft Power Apps misconfiguration exposes 38 million records James Vincent / The Verge : Check your permissions: default settings in M...
A look at the criticism in DC directed at CSET, a State Dept. bureau focused on cybersecurity and emerging technologies formed in the last days of Trump's admin
Maggie Miller / The Hill :
European Medicines Agency says that hackers leaked third-party documents on COVID-19 vaccines and medicines as part of a breach discovered late last year
Maggie Miller / The Hill :
DHS and the FBI are investigating a robocall and text campaign warning US voters to “stay safe and stay home”
Despite scattered reports … New York Times : Despite Fears of Violence, Election Day Proceeds Smoothly as Millions Line Up to Vote Kate Cox / Ars Technica : “Stay Home” robocalls to voters prompt FBI,...
Sources: the FBI is leading a federal inquiry into the Twitter hack
don't have sensitive conversations in Twitter DMs. Move that stuff to Signal. You don't know who'll be in charge of Twitter five, ten, or twenty years from now. Remember the example of LiveJournal. ht...
An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12
In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iPhone security flaws ...