Information security

[ follow ]
fromInfoQ
12 hours ago

Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years

Exploiting the so-called "RediShell" remote code execution vulnerability, an authenticated user can use a specially crafted script to manipulate the garbage collector, trigger a use-after-free, and potentially execute arbitrary code remotely. The vulnerability exploits a 13-year-old UAF memory corruption bug in Redis, allowing a post-auth attacker to send a crafted Lua script to escape the default Lua sandbox and execute arbitrary native code.
Information security
Information security
fromThe Hacker News
1 day ago

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

A malicious VS Code extension named susvsex uses AI-assisted code to zip, exfiltrate, and encrypt files and leverages GitHub as a command-and-control channel.
Information security
fromInfoWorld
1 day ago

Malicious npm packages contain Vidar infostealer

Malicious npm packages delivered Vidar infostealer via postinstall scripts, remained on the registry for about two weeks, and were downloaded over 2,240 times.
Information security
fromTheregister
20 hours ago

Crims plant time bomb malware in industrial .NET extensions

Malicious NuGet packages published in 2023 contained small destructive payloads hidden in benign code, scheduled to trigger between 2027–2028, including attacks on industrial PLCs.
Information security
fromThe Hacker News
23 hours ago

Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation

Nine NuGet packages contained time-delayed logic bombs able to sabotage databases and industrial PLCs, with trigger dates set for August 2027 and November 2028.
fromThe Hacker News
19 hours ago

From Log4j to IIS, China's Hackers Turn Legacy Bugs into Global Espionage Tools

A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are linked to or involved in policy issues. The organization, according to a report from Broadcom's Symantec and Carbon Black teams, is "active in attempting to influence U.S. government policy on international issues." The attackers managed to gain access to the network for several weeks in April 2025.
Information security
#credential-compromise
Information security
fromTechzine Global
1 day ago

Cisco firewalls under attack: patching required

Cisco firewall products face ongoing exploitation causing device reboots and network outages; urgent updating to the latest patched software is required to prevent service disruption.
Information security
fromThe Hacker News
17 hours ago

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp

A zero-day in Samsung's libimagecodec.quram.so (CVE-2025-21042) was exploited to deliver LANDFALL spyware via malicious WhatsApp DNG images targeting the Middle East.
Information security
fromFast Company
1 day ago

Why Google is really warning 2.5 billion Gmail users to stop using their passwords

Google advises abandoning passwords in favor of stronger protections after Salesforce-sourced data boosted targeted phishing and impersonation attacks.
Information security
fromArs Technica
16 hours ago

Commercial spyware "Landfall" ran rampant on Samsung phones for almost a year

A Samsung image-processing vulnerability enabled zero-click Landfall spyware to install via malicious images, modify SELinux for deep access, exfiltrate data, and activate sensors.
fromTechCrunch
16 hours ago

Washington Post confirms data breach linked to Oracle hacks | TechCrunch

Last month, Google said that the ransomware gang Clop was targeting companies after exploiting multiple vulnerabilities in Oracle's E-Business Suite software, which companies use for their business operations, storing their human resources files, and other sensitive data. The exploits allowed the hackers to steal their customer's business data and employee records from more than 100 companies, per Google.
Information security
Information security
fromAxios
1 day ago

Congressional Budget Office investigating hack of its systems

Nation-state hackers breached Congressional Budget Office systems, potentially exposing internal communications about pending legislation; the CBO says it contained the incident and increased monitoring.
fromTheregister
14 hours ago

Landfall spyware used in 0-day attacks on Samsung phones

A previously unknown Android spyware family called LANDFALL exploited a zero-day in Samsung Galaxy devices for nearly a year, installing surveillance code capable of recording calls, tracking locations, and harvesting photos and logs before Samsung finally patched it in April. The surveillance campaign likely began in July 2024 and abused CVE-2025-21042, a critical bug in Samsung's image-processing library that affects Galaxy devices running Android versions 13, 14, 15, and 16,
Information security
Information security
fromTechzine Global
20 hours ago

Arctic Wolf acquires UpSight Security for ransomware prevention in Aurora

Arctic Wolf is acquiring UpSight Security to add on-device predictive AI ransomware prevention and rollback to the Aurora endpoint platform, preventing encryption and enabling recovery.
fromComputerWeekly.com
20 hours ago

Resilience for resilience: Managing burnout among cyber leaders | Computer Weekly

CISOs often operate in environments where security is underfunded, under prioritised, or misunderstood at the board and C-suite level. A lack of senior-level buy-in trickles down into: Budget constraints that limit the scope and impact of the CISO function, including resources for tooling and automation. Skills shortages and restrictive operating models that prevent effective delegation. Strategic misalignment, where short-term delivery is prioritised over long-term business resilience and customer outcomes.
Information security
fromArs Technica
23 hours ago

How to trade your $214,000 cybersecurity job for a jail cell

Martin had apparently seen how this system worked in practice through his job, and he approached a pair of other people to help him make some easy cash. One of these people was allegedly Ryan Goldberg of Watkinsville, Georgia, who worked as an incident manager at the cybersecurity firm Sygnia. Goldberg told the FBI that Martin had recruited him to "try and ransom some companies."
Information security
fromWIRED
13 hours ago

The Government Shutdown Is a Ticking Cybersecurity Time Bomb

implemented additional monitoring and new security controls to further protect the agency's systems
Information security
fromAbove the Law
20 hours ago

Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack - Above the Law

Last year almost a dozen major U.S. ISPs were the victim of a massive, historic intrusion by Chinese hackers who managed to spy on public U.S. officials for more than a year. The "Salt Typhoon" hack was so severe, the intruders spent much of the last year rooting around the ISP networks even after discovery. AT&T and Verizon, two of the compromised companies, apparently didn't think it was worth informing subscribers any of this happened.
Information security
#identity-theft
Information security
fromSecuritymagazine
1 day ago

Panelists Return to SECURITY 500 to Discuss Navigating Tough Decisions

Security leaders will confront high-stakes ethical dilemmas through an interactive "Would You Rather" panel at the 2025 SECURITY 500 Conference in Washington, D.C.
Information security
fromInfoWorld
1 day ago

We can't ignore cloud governance anymore

Effective cloud governance with top-down commitment transforms risks into opportunities, enabling innovation, accountability, and reduced outages, inefficiencies, and non-compliance.
Information security
fromThe Hacker News
1 day ago

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

A Russia-aligned cluster called InedibleOchotense impersonated ESET to deliver trojanized installers that deploy the Kalambur C# backdoor, enable OpenSSH and RDP, and use Tor for C2 in Ukraine.
Information security
fromTechzine Global
1 day ago

Invisible malware spread via VS Code extensions

GlassWorm infected Visual Studio Code extensions using invisible Unicode and Solana blockchain command-and-control; OpenVSX was impacted but later contained and remediated.
Information security
fromInfoWorld
1 day ago

RCE in React Native CLI opens Dev Servers to attacks

The Metro development server exposes an unsafe /open-url endpoint and defaults to listening on 0.0.0.0, allowing remote command execution unless patched.
fromArs Technica
1 day ago

Wipers from Russia's most cut-throat hackers rain destruction on Ukraine

In April, the group targeted a Ukrainian university with two wipers, a form of malware that aims to permanently destroy sensitive data and often the infrastructure storing it. One wiper, tracked under the name Sting, targeted fleets of Windows computers by scheduling a task named DavaniGulyashaSdeshka, a phrase derived from Russian slang that loosely translates to "eat some goulash," researchers from ESET said. The other wiper is tracked as Zerlot.
Information security
#cybercrime
#gootloader
Information security
fromZDNET
1 day ago

Google spots malware in the wild that morphs mid-attack, thanks to AI

AI-powered large language models are being used in active cyberattacks to create adaptive malware that dynamically rewrites code, steals credentials, and evades detection.
Information security
fromTheregister
1 day ago

What are the most common passwords? No surprises here

Predictable numeric and keyboard-sequence passwords remain extremely common, making accounts highly vulnerable to modern cracking tools and brute-force attacks.
fromTheregister
1 day ago

SonicWall blames state-backed crew for September breach

SonicWall has blamed an unnamed, state-sponsored collective for the September break-in that saw cybercriminals rifle through a cache of firewall configuration backups. The network security vendor said it spotted "suspicious activity" in early September involving the unauthorized downloading of backup firewall configuration files from "a specific cloud environment." The company initially said that "fewer than 5 percent" of its firewall installed base had files accessed,
Information security
Information security
fromIT Pro
2 days ago

M&S reveals massive financial hit from cyber attack

A cyber attack drove Marks & Spencer's H1 2025 statutory profit down 99%, generating roughly £102m of one-off costs despite a £100m insurance payout.
fromSecuritymagazine
2 days ago

The Silent Insider Threat: When Employees Undermine Cybersecurity Messaging

Cybersecurity is as much about communication as it is about code. When leadership sends mixed signals - one message in a company memo, another in marketing materials - the inconsistency confuses employees and customers alike. A StratusPoint IT report found that 74% of data breaches involved a human element, including social engineering and error. These incidents often begin with misunderstanding rather than malice.
Information security
#cybersecurity
fromComputerworld
2 days ago
Information security

24/7 Monitoring no longer an option: How organisations can stay vigilant even without dedicated security teams

fromTechCrunch
2 days ago
Information security

Armis raises $435M pre-IPO round at $6.1B valuation after refusing M&A offers | TechCrunch

fromComputerworld
2 days ago
Information security

24/7 Monitoring no longer an option: How organisations can stay vigilant even without dedicated security teams

fromTechCrunch
2 days ago
Information security

Armis raises $435M pre-IPO round at $6.1B valuation after refusing M&A offers | TechCrunch

fromThe Hacker News
2 days ago

Bitdefender Named a Representative Vendor in the 2025 Gartner Market Guide for Managed Detection and Response

Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) - marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver MDR services, yet only a select few meet the criteria to appear in the Market Guide. While inclusion is not a ranking or comparative assessment, we believe it underscores Bitdefender's human-driven approach to MDR and our continued alignment with Gartner's rigorous inclusion standards.
Information security
#ransomware
fromIT Pro
2 days ago
Information security

When cyber professionals go rogue: A former 'ransomware negotiator' has been charged amid claims they attacked and extorted businesses

fromThe Hacker News
4 days ago
Information security

Ransomware Defense Using the Wazuh Open Source Platform

Ransomware encrypts or locks systems and increasingly exfiltrates data for double extortion, spreading via phishing, exploits, RaaS, and sophisticated development and propagation techniques.
fromwww.mercurynews.com
3 days ago
Information security

Ex-cybersecurity staffers charged with moonlighting as hackers

Three cybersecurity employees allegedly conducted ransomware attacks while working in incident response and negotiation roles, extorting victims and sharing illicit proceeds with ransomware developers.
fromIT Pro
2 days ago
Information security

When cyber professionals go rogue: A former 'ransomware negotiator' has been charged amid claims they attacked and extorted businesses

fromThe Cipher Brief
1 day ago

Former GCHQ Chief: Cybersecurity, AI, and the New Age of Multilateral Defense

I think the big cyber incidents happening in the Middle East and Europe in recent months, particularly ransomware as a service, so big names like Jaguar Land Rover and others, have kind of given this meeting an extra buzz just before we met. Quite a few people flew in from that have been affected by the supply chain attack on baggage handling software. So it was very relevant and topical.
Information security
#ai-enabled-malware
Information security
fromSustainable Bus
1 day ago

Yutong responds to cybersecurity allegations: "Remote control technically impossible" - Sustainable Bus

Yutong states remote control of its buses is technically impossible because the telematics unit is not physically connected to steering, propulsion, or braking systems.
Information security
fromZDNET
1 day ago

Logging in as root on Linux? Here's why that disaster waiting to happen

Never log in as the root user on Linux; use sudo for elevated privileges to reduce risk of accidental or malicious system changes.
fromThe Hacker News
1 day ago

From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI organizations in several regions, including DORA (Digital Operational Resilience Act) in the EU; CPS230 / CORIE (Cyber Operational Resilience Intelligence-led Exercises) in Australia;
Information security
#deepfakes
fromZDNET
1 day ago
Information security

Is your business ready for a deepfake attack? 4 steps to take before it's too late

fromZDNET
1 day ago
Information security

Is your business ready for a deepfake attack? 4 steps to take before it's too late

Information security
fromTechzine Global
1 day ago

What does it mean to be "Safer with Yealink"?

SAFER (Standards, Accountability, Future-proof, Ethics, Reliability) creates an end-to-end security framework delivering device, communication, and lifecycle protection with key management and RBAC.
Information security
fromElectronic Frontier Foundation
1 day ago

EFF Teams Up With AV Comparatives to Test Android Stalkerware Detection by Major Antivirus Apps

Stalkerware detection remains uneven: some Android antivirus products detect nearly all stalkerware while others miss many samples, including default Google Play Protect.
fromTechzine Global
3 days ago

Pro-Russian hackers hide in Windows with Linux VMs

The group, which according to the researchers operates in line with Russian geopolitical interests, uses hidden Linux virtual machines to bypass detection by traditional security measures. The investigation, conducted in collaboration with the Georgian CERT, revealed that the attackers exploit Hyper-V, the built-in virtualization technology of Windows 10. After gaining access to a target, they activate Hyper-V but disable the management tools to prevent monitoring by system administrators.
Information security
Information security
fromTheregister
2 days ago

AMD to fix buggy RNG endangering cryptographic security

RDSEED flaw CVE-2025-62626 in Zen 5 CPUs can return zeros, weakening cryptographic keys; AMD will issue microcode patches and offers workarounds.
Information security
fromThe Hacker News
3 days ago

Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran-Israel Tensions

UNK_SmudgedSerpent conducted cyber espionage targeting academics and foreign policy experts using Iranian-themed lures, credential phishing, impersonation, and RMM malware delivery.
fromAxios
2 days ago

Hackers are already using AI-enabled malware, Google says

Zoom in: Google's team found PromptFlux while scanning uploads to VirusTotal, a popular malware-scanning tool, for any code that called back to Gemini. The malware appears to be in active development: Researchers observed the author uploading updated versions to VirusTotal, likely to test how good it is at evading detection. It uses Gemini to rewrite its own source code, disguise activity and attempt to move laterally to other connected systems.
Information security
Information security
fromThe Hacker News
2 days ago

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

PROMPTFLUX is VBScript malware that uses Google Gemini API to generate obfuscated, self-modifying code for evasion, persistence, and propagation.
Information security
fromComputerWeekly.com
3 days ago

Bugcrowd brings Mayhem AI to bear on ethical hacking community | Computer Weekly

Bugcrowd acquired Mayhem Security to combine human ethical hackers with AI-driven automated testing, creating an adaptive, self-learning security platform that reduces attack surfaces.
Information security
fromIT Pro
3 days ago

Are your virtualized environments secure?

Virtualization provides flexibility and cost efficiency but creates unique security risks centered on vulnerable hosts and unprotected guest VMs, especially in test environments.
Information security
fromSustainable Bus
3 days ago

Denmark examines potential cybersecurity gap in Chinese-made electric buses, The Guardian reports - Sustainable Bus

Several hundred Chinese-built electric buses may have remotely accessible systems enabling potential remote control or deactivation via OTA or diagnostic internet-connected software.
fromZDNET
2 days ago

Did your logins just get leaked? How to check online for free (and what to do next)

Have I Been Pwned (HIBP) is a data breach "search engine" that allows anyone to submit their email address to see if any links to a data breach are publicly known. HIBP is a free service that can give you an overview of whether or not it is likely your online accounts have been "pwned," or compromised, in a data breach.
Information security
Information security
fromTechCrunch
2 days ago

University of Pennsylvania confirms hacker stole data during cyberattack | TechCrunch

A hacker breached University of Pennsylvania development and alumni systems, exfiltrating data and sending fraudulent emails from official @upenn.edu addresses.
Information security
fromZDNET
3 days ago

My top 5 password managers for Linux - and my favorite works on Windows and MacOS too

Use a password manager on Linux; multiple open-source, feature-rich options like Bitwarden and Buttercup provide strong security, cross-platform support, and self-hosting choices.
fromInfoQ
3 days ago

Azure Front Door Outage: How a Single Control-Plane Defect Exposed Architectural Fragility

The ADF outage, triggered by a faulty control-plane configuration change, brought Microsoft 365, Xbox Live, the Azure Portal, and thousands of customer websites to a crawl before a staged recovery returned services to normal. Moreover, the outage's blast radius was broad, demonstrating the profound dependency of the entire Microsoft ecosystem and its customers on AFD as a centralized edge fabric.
Information security
Information security
fromThe Hacker News
2 days ago

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

Seven vulnerabilities in GPT-4o and GPT-5 enable indirect prompt-injection attacks that can exfiltrate users' memories and chat histories.
fromComputerworld
2 days ago

Office sandbox file security to disappear from enterprise Windows by late 2027, Microsoft confirms

Although many enterprise IT teams are probably not hugely aware of MDAG, there could still be hidden work caused by its removal. Microsoft, for its part, recommends that administrators do the following: Enable Microsoft Defender for Endpoint ASR rules to block risky Office file behaviors. Enable Windows Defender Application Control (WDAC) to ensure only trusted, signed code runs on devices. Review internal documentation and helpdesk guidance if your organization previously relied on Application Guard for Office.
Information security
Information security
fromForbes
2 days ago

7 Remote Jobs That Will Survive The Next Tech Layoffs

Seven remote roles—starting with cybersecurity and healthcare IT—offer flexibility and relative layoff resistance as companies adopt AI and streamline operations.
Information security
fromThe Hacker News
3 days ago

Why SOC Burnout Can Be Avoided: Practical Steps

Providing real-time, full behavioral context reduces SOC alert fatigue, increases analyst efficiency, and prevents burnout through connected, interactive analysis.
Information security
fromIT Pro
3 days ago

'Data sprawl' is now your security team's biggest headache - and it's only going to get worse

Data sprawl across cloud and hybrid environments rapidly increases volumes, abandons storage, inflates costs, widens attack surfaces, and drives frequent, often staff-caused, data loss incidents.
fromTechzine Global
2 days ago

SentinelOne integrates its acquisitions and protects AI with AI

Following the recent acquisition of Observo AI, SentinelOne is integrating this technology into the Singularity Platform. According to the company, the combination creates the only SIEM on the market with both pre-ingestion analytics and flexible data collection. This is made possible by Observo AI's streaming architecture, which made it an attractive acquisition target for SentinelOne. This speed should enable agentic applications, allowing security work to be largely automated in real time. SentinelOne summarizes all this as an "AI-ready data pipeline."
Information security
Information security
fromTechzine Global
2 days ago

Cloudian and CTERA combine object and file storage

Cloudian and CTERA provide a unified edge-to-cloud data platform combining intelligent edge caching with scalable, S3-compatible object storage and centralized management.
Information security
fromTheregister
2 days ago

Google-Wiz $32B deal cleared by DOJ

The DOJ cleared Google's $32 billion acquisition of cloud security firm Wiz, marking Google's largest-ever acquisition and advancing integration of Wiz into Google Cloud.
Information security
from24/7 Wall St.
2 days ago

Fortinet Shares Down 10% Despite Reporting Strong Q3 Financials

Fortinet reported Q3 beats and record operating margins, with product revenue growth, but net income, cash and equity declined amid rising capex.
Information security
fromTheregister
3 days ago

Russian spies pack custom malware into hidden VMs on Windows

Curly COMrades uses Hyper-V to run a hidden Alpine Linux VM that evades endpoint security, enabling persistent network access and custom malware deployment.
Information security
fromThe Hacker News
4 days ago

Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

Phishing weaponized attachments deploy a persistent OpenSSH backdoor using a customized Tor obfs4 hidden service targeting defense organizations in Russia and Belarus.
#microsoft-teams
fromTechzine Global
3 days ago

Hackers exploit vulnerability in JobMonster WordPress theme

Hackers are actively exploiting a serious security vulnerability in the popular JobMonster WordPress theme. The vulnerability allows attackers to take over administrator accounts under specific circumstances, giving them complete control over affected websites. The vulnerability, registered as CVE-2025-5397, received a risk score of 9.8 out of 10. The problem is present in all versions of the theme up to and including 4.8.1.
Information security
fromIT Pro
3 days ago

A notorious ransomware group is spreading fake Microsoft Teams ads to snare victims

The current infection chain is built on a highly successful malvertising model. Threat actors buy Bing search engine advertisements to direct users to convincing-looking, but malicious landing pages," said Aaron Walton, threat intelligence analyst at Expel. "These search engine ads put links to the download right in front of potential victims. The most recent campaigns push ads for Microsoft Teams and impersonate the download pages. However, they've also cycled through other popular software such as PuTTy and Zoom.
Information security
#sesameop
Information security
fromwww.techzine.eu
3 days ago

RMM software: a new weapon in the fight against cargo theft

Cybercriminals exploit RMM tools via compromised freight accounts to manipulate bookings, steal cargo, and resell goods, targeting logistics operations worldwide.
Information security
fromZDNET
3 days ago

AMD confirms Zen 5 chips hit by critical bug - but a fix on the way

A Zen 5 RDSEED implementation bug causes successful calls to return zero over ~10% of the time, undermining cryptographic randomness in many AMD processors; fixes are forthcoming.
Information security
fromTheregister
4 days ago

Microsoft: OpenAI API moonlights as malware HQ

SesameOp leverages the OpenAI Assistants API as a covert command-and-control channel, hiding malicious commands and exfiltration within legitimate api.openai.com traffic.
Information security
fromSecuritymagazine
4 days ago

1.2M Individuals' Data Stolen In University Hacking

A cyber incident at the University of Pennsylvania led to mass malicious emails and alleged theft of personal data of about 1.2 million community members.
Information security
fromThe Hacker News
4 days ago

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

Three U.S. nationals allegedly used BlackCat ransomware to hack five U.S. companies between May and November 2023 and extorted cryptocurrency payments.
Information security
fromComputerworld
4 days ago

AI web browsers are cool, helpful, and utterly untrustworthy

AI-enabled web browsers expand attack surfaces and can execute hidden instructions, risking data exposure, unauthorized actions, and malware.
Information security
fromThe Mercury News
3 days ago

Consumer tip: Meeting people online? Watch out for scammers

Online criminals increasingly use fake friendships and affinity fraud to build trust and solicit untraceable payments via crypto, gift cards, or P2P apps.
Information security
fromComputerWeekly.com
3 days ago

We can alleviate the expanding burden on the CISO | Computer Weekly

Modern CISOs juggle strategic, regulatory, operational, budgetary, and emotional pressures, balancing risk and cost while facing scrutiny and rising burnout risk.
fromTheregister
3 days ago

US CFPB's infosec posture crumbles amid staff exodus

The infosec program run by the US' Consumer Financial Protection Bureau (CFPB) "is not effective," according to a fresh audit published by the Office of the Inspector General (OIG). A summary of the report, dated October 31 and published on Monday, stated that since the OIG's previous audit, the CFPB's overall cybersecurity posture has decreased from level-4 maturity, defined as "managed and measurable," to level-2 maturity - "defined."
Information security
fromAxios
3 days ago

Election security cutbacks force local officials to go it alone

Local election offices are left with fewer resources, less threat intelligence, and diminished federal guidance. "It's kind of heartbreaking to know that they worked [on] creating these relationships and partnerships over the last decade, and they'renowjust disintegrating," Brianna Lennon, the county clerk in Missouri's Boone County, tells Axios. Bloomberg reported yesterday thattheCybersecurity and Infrastructure Security Agency's election monitoring room, which has been stood up during every election cycle to field and share information about active threats to elections, isn't operating this year.
Information security
[ Load more ]