Cybersecurity Alerts


08/14  NIST Small Business Cybersecurity Webinar: Protecting Your Small Bu...
Phishing is one of the most common types of cyber crime. These scams use convincin...
06/26  Iris Experts Group (IEG) Annual Meeting
The Iris Experts Group is a forum for the discussion of technical questions of int...
05/20  CSF 2.0 Webinar Series: Deep-Dive into the CSF 2.0 Govern Function ...
One of the major updates to CSF 2.0 is the creation of the Govern Function, highli...
05/07  5th High-Performance Computing Security Workshop
High-performance computing (HPC) systems provide fundamental computing infrastruct...
04/08  Open Industrial Digital Ecosystem Summit
The Open Industrial Digital Ecosystem Summit is an annual event bringing together ...
04/02  Threat Level - GUARDED
On April 2, the Cyber Threat Alert Level was evaluated and is remaining at Blue (G...
04/01  April is Emergency Communications Month!
04/01  Building Resilient ICT Supply Chains:  8th Annual Supply Chain Inte...
03/31  SAFECOM Publishes Fall 2024 SAFECOM Bi-Annual Meeting Executive Sum...
03/28  A Vulnerability in CrushFTP Could Allow for Unauthorized Access
A vulnerability has been discovered in CrushFTP, which could allow for unauthorize...
03/26  A Vulnerability in Google Chrome Could Allow for Arbitrary Code Exe...
A vulnerability has been discovered in Google Chrome, which could allow for arbitr...
03/26  The Essential Role of AISIRT in Flaw and Vulnerability Management
The SEI established the first Artificial Intelligence Security Incident Response T...
03/25  macOS Security Compliance Project Developer Conference
The National Institute of Standards and Technology will host a developer conferenc...
03/24  DeepSeek: A New Player in the Global AI Race
CIS analysts break down the rise of DeepSeek, a GenAI model that collects data and...
03/24  Enhancing Machine Learning Assurance with Portend
This post introduces Portend, a new open source toolset that simulates data drift ...
03/21  A Vulnerability in Google Chrome Could Allow for Arbitrary Code Exe...
A vulnerability has been discovered in Google Chrome, which could allow for arbitr...
03/21  A Vulnerability in Veeam Backup & Replication Could Allow for Arbit...
A vulnerability has been discovered in Veeam Backup & Replication, which could all...
03/20  Active Lumma Stealer Campaign Impacting U.S. SLTTs
The CIS CTI team spotted a Lumma Stealer campaign where SLTT victims were redirect...
03/20  CSF 2.0 Webinar Series: Implementing CSF 2.0—The Why, What, and How
To address the ever-evolving cybersecurity landscape and equip organizations with ...
03/20  A Vulnerability in AMI MegaRAC Software Could Allow for Remote Code...
A vulnerability has been discovered in AMI MegaRAC Software, which could allow for...
03/20  Cybersecurity of Logistics Decision Models
Goods, services, and people simply cannot get to where they are needed without eff...
03/18  A Vulnerability in Apache Tomcat Could Allow for Remote Code Execution
A vulnerability has been discovered in Apache Tomcat, which could allow for remote...
03/18  CISA Probationary Reinstatements
03/14  MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Sante ...
Multiple vulnerabilities have been discovered in Sante PACS Server, the most sever...
03/12  Statement on CISA's Red Team
03/12  Multiple Vulnerabilities in Google Android OS Could Allow for Remot...
Multiple vulnerabilities have been discovered in Google Android OS, the most sever...
03/12  Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitr...
Multiple vulnerabilities have been discovered in Mozilla products, the most severe...
03/11  Multiple Vulnerabilities in Fortinet Products Could Allow for Remot...
Multiple vulnerabilities have been discovered Fortinet Products, the most severe o...
03/11  Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrar...
Multiple vulnerabilities have been discovered in Adobe products, the most severe o...
03/11  Critical Patches Issued for Microsoft Products, March 11, 2025
Multiple vulnerabilities have been discovered in Microsoft products, the most seve...
03/11  Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary...
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of...
03/11  #StopRansomware: Medusa Ransomware
Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomw...
03/11  NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption
The new algorithm will serve as a backup for the general encryption needed to prot...
03/10  CIS Benchmarks March 2025 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (C...
03/10  The DevSecOps Capability Maturity Model
Implementing DevSecOps can improve multiple aspects of the effectiveness of a soft...
03/06  NIST Finalizes Guidelines for Evaluating ‘Differential Privacy’ Gua...
Using differential privacy can help organizations glean useful insights from datab...
03/05  Workshop on Foundational Cybersecurity Activities for IoT Device Ma...
NIST will host a full-day workshop at the NCCoE to continue discussions related to...
03/05  Multiple vulnerabilities have been discovered in VMware ESXi, Works...
Multiple vulnerabilities have been discovered in VMware ESXi, Workstation, and Fus...
03/03  Detection and Repair: The Cost of Remediation
This year, we plan on making some exciting updates to the SEI CERT C Coding Standa...
02/27  Perspectives on Generative AI in Software Engineering and Acquisition
It is essential that software and acquisition professionals learn how to apply AI-...
02/26  Celebrating 1 Year of CSF 2.0
It has been one year since the release of the NIST Cybersecurity Framework (CSF) 2...
02/25  NCSWIC Publishes Spring 2024 Bi-Annual Meeting Executive Summaries
02/24  Protecting AI from the Outside In: The Case for Coordinated Vulnera...
This post highlights lessons learned from applying the coordinated vulnerability d...
02/19  #StopRansomware: Ghost (Cring) Ransomware
Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomw...
02/17  Introducing MLTE: A Systems Approach to Machine Learning Test and E...
Machine learning systems are notoriously difficult to test. This post introduces M...
02/12  Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary...
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of...
02/12  Multiple Vulnerabilities in Fortinet Products Could Allow for Remot...
Multiple vulnerabilities have been discovered Fortinet Products, the most severe o...
02/11  Critical Patches Issued for Microsoft Products, February 11, 2025
Multiple vulnerabilities have been discovered in Microsoft products, the most seve...
02/11  Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrar...
Multiple vulnerabilities have been discovered in Adobe products, the most severe o...
02/11  SAFECOM Publishes Spring 2024 SAFECOM Bi-Annual Meeting Executive S...