LAS VEGAS, NV – JANUARY 02: Exterior view of Welcome to Fabulous Las Vegas Nevada sign is seen on January 02, 2006 in Las Vegas, Nevada. (Photo by BG032/Bauer-Griffin/GC Images) Las Vegas didn’t fold during CrowdStrike outage Sin City’s chief information officer says incident response playbooks and muscle memory limited the incident’s impact locally. Aug 16, 2024 By Christian Vasquez
Jen Easterly, director of the Homeland Security Department’s Cybersecurity and Infrastructure Security Agency, testifies during a hearing by the House (Select) Strategic Competition Between the United States and the Chinese Communist Party Committee on Capitol Hill on January 31, 2024 in Washington, DC. (Photo by Kevin Dietsch/Getty Images) Easterly: Potential Chinese cyberattack could unfold like CrowdStrike error CISA director calls CrowdStrike-linked outage a “dress rehearsal” for what China may have planned for U.S. critical infrastructure. Aug 7, 2024 By AJ Vicens
The U.S. Capitol is seen in Washington, DC, on November 14, 2023. (Photo by Stefani Reynolds / AFP) Cyber Safety Review Board needs stronger authorities, more independence, experts say The CSRB needs to become more transparent regarding its membership and the cases it takes on, experts told Congress. Jan 17, 2024 By Derek B. Johnson
Spacecraft launch. Elements of this image furnished by NASA. (Getty Images) Satellite hack on eve of Ukraine war was a coordinated, multi-pronged assault The satellite hack that took the world by storm was more complex than initially thought, according to a Viasat executive. Aug 10, 2023 By Christian Vasquez Elias Groll
A Russian police officer guards the Red Square near the Kremlin, June 24, 2023, in Moscow, Russia. (Photo by Contributor/Getty Images) Ukrainian official: Russian hackers change tactics from disruptive attacks Russian hackers have become increasingly focused on intelligence gathering to gain advantage on the battlefield. Aug 9, 2023 By Christian Vasquez
‘Downfall’ vulnerability leaves billions of Intel CPUs at risk A vulnerability in Intel’s x86 chips major raises questions about the assumptions underlying computer security models. Aug 8, 2023 By Elias Groll
(CyberScoop / Chris Bing) NSA’s reverse-engineering malware tool, Ghidra, to get new features to save time, boost accuracy The spy agency says it has listened to feedback from users and is integrating some of those ideas into the software. Aug 8, 2019 By Shannon Vavra
(Flickr) Will Hurd’s Black Hat keynote nixed amid criticism of voting record The conference has canceled the Republican congressman's keynote after criticism of his voting record on women’s rights issues. Jun 14, 2019 By Sean Lyngaas
(Getty Images) FDA warns users of cyber vulnerability in pacemaker programmers The FDA has issued a cybersecurity advisory for two models of programmers used on cardiac devices like pacemakers and defibrillators. Oct 12, 2018 By Sean Lyngaas
Marines sit at a Joint Tactical Common Operation Picture Workstation, or JTCW. DOD unveils ‘Hack the Marine Corps’ bounty program A new bug bounty program intended to find vulnerabilities in the Marine Corps’ public-facing websites will be the DOD's sixth such program. Aug 13, 2018 By Mark Satter