CISA Expands Vulnerability Reporting
CISA has created a new pathway for researchers to report vulnerabilities to its Known Exploited Vulnerabilities catalog, enhancing its ability to identify and share critical threat information.
Lawmakers are demanding answers from CISA after a contractor leaked agency secrets on a public GitHub account, raising concerns about the agency's internal policies and procedures.
CISA has created a new pathway for researchers to report vulnerabilities to its Known Exploited Vulnerabilities catalog, enhancing its ability to identify and share critical threat information.
Crypto drainers are tools designed to steal cryptocurrency assets by abusing wallet permissions and transaction approvals, often through social engineering tactics.
CISA acting director Nick Andersen warns of the risks posed by open-source vulnerabilities and the need for urgent security improvements to prevent widespread attacks.
Two Americans, Adam Young and Harrison Gevirtz, pleaded guilty to assisting India-based tech support scam centers that stole millions from US citizens.
Google accidentally leaked details of an unfixed Chromium flaw that allows remote code execution on devices, impacting all Chromium-based browsers.
Major tech firms, including Snapchat and Meta, have promised to make changes to their platforms to better protect children from harmful content and grooming.
President Donald Trump has postponed the release of an executive order focused on AI security, citing concerns it could harm US AI industry competition with countries like China.
The UK's proposed cybercrime law reform would offer limited legal protections, leaving most security researchers vulnerable to prosecution.
GitHub's internal repositories were impacted after an employee device was compromised through a poisoned Visual Studio Code extension, with critical secrets rotated and the highest-impact credentials prioritized first.