Content Paint

NSA

Wanted: Chief Data Officer for the US intelligence community

Enjoy dealing with projects with “ill-defined requirements, ambiguity and high risks."

China details custom offensive tools, says NSA hacked “tens of thousands of devices”

Multiple versions of "Stoic surgeon" backdoor used in attack says CVERC

This is how Chinese hackers are breaching telcos worldwide, say US authorities

SOHO devices and unpatched enterprise switches are the way in.

BPFDoor: Chinese tool almost undetected for FIVE years is second BPF-based attack this year

Researchers warn of risks from extending BPF beyond Linux.

NSA Cybersecurity boss: Attackers put in time to know network, devices better than defenders

Here with a handy 'top 5' list of security practices...

Russia is exploiting these five publicly known vulnerabilities to target the US and Allies

Check your networks for indicators of compromise related to all five vulnerabilities

Microsoft admits breach, as SolarWinds hack fallout continues

"This is not 'espionage as usual' even in the digital age"

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.