08/14 | NIST Small Business Cybersecurity Webinar: Protecting Your Small Bu... Phishing is one of the most common types of cyber crime. These scams use convincin... |
06/26 | Iris Experts Group (IEG) Annual Meeting The Iris Experts Group is a forum for the discussion of technical questions of int... |
05/07 | 5th High-Performance Computing Security Workshop High-performance computing (HPC) systems provide fundamental computing infrastruct... |
04/08 | Open Industrial Digital Ecosystem Summit The Open Industrial Digital Ecosystem Summit is an annual event bringing together ... |
03/26 | A Vulnerability in Google Chrome Could Allow for Arbitrary Code Exe... A vulnerability has been discovered in Google Chrome, which could allow for arbitr... |
03/26 | Threat Level - GUARDED On March 26, the Cyber Threat Alert Level was evaluated and is remaining at Blue (... |
03/26 | The Essential Role of AISRT in Flaw and Vulnerability Management The SEI established the first Artificial Intelligence Security Incident Response T... |
03/25 | macOS Security Compliance Project Developer Conference The National Institute of Standards and Technology will host a developer conferenc... |
03/24 | DeepSeek: A New Player in the Global AI Race CIS analysts break down the rise of DeepSeek, a GenAI model that collects data and... |
03/24 | Enhancing Machine Learning Assurance with Portend This post introduces Portend, a new open source toolset that simulates data drift ... |
03/21 | A Vulnerability in Google Chrome Could Allow for Arbitrary Code Exe... A vulnerability has been discovered in Google Chrome, which could allow for arbitr... |
03/21 | A Vulnerability in Veeam Backup & Replication Could Allow for Arbit... A vulnerability has been discovered in Veeam Backup & Replication, which could all... |
03/20 | Active Lumma Stealer Campaign Impacting U.S. SLTTs The CIS CTI team spotted a Lumma Stealer campaign where SLTT victims were redirect... |
03/20 | CSF 2.0 Webinar Series: Implementing CSF 2.0—The Why, What, and How To address the ever-evolving cybersecurity landscape and equip organizations with ... |
03/20 | A Vulnerability in AMI MegaRAC Software Could Allow for Remote Code... A vulnerability has been discovered in AMI MegaRAC Software, which could allow for... |
03/20 | Cybersecurity of Logistics Decision Models Goods, services, and people simply cannot get to where they are needed without eff... |
03/18 | A Vulnerability in Apache Tomcat Could Allow for Remote Code Execution A vulnerability has been discovered in Apache Tomcat, which could allow for remote... |
03/18 | CISA Probationary Reinstatements
|
03/14 | MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Sante ... Multiple vulnerabilities have been discovered in Sante PACS Server, the most sever... |
03/12 | Statement on CISA's Red Team
|
03/12 | Multiple Vulnerabilities in Google Android OS Could Allow for Remot... Multiple vulnerabilities have been discovered in Google Android OS, the most sever... |
03/12 | Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitr... Multiple vulnerabilities have been discovered in Mozilla products, the most severe... |
03/11 | Multiple Vulnerabilities in Fortinet Products Could Allow for Remot... Multiple vulnerabilities have been discovered Fortinet Products, the most severe o... |
03/11 | Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrar... Multiple vulnerabilities have been discovered in Adobe products, the most severe o... |
03/11 | Critical Patches Issued for Microsoft Products, March 11, 2025 Multiple vulnerabilities have been discovered in Microsoft products, the most seve... |
03/11 | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary... Multiple vulnerabilities have been discovered in Google Chrome, the most severe of... |
03/11 | #StopRansomware: Medusa Ransomware Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomw... |
03/11 | NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption The new algorithm will serve as a backup for the general encryption needed to prot... |
03/10 | CIS Benchmarks March 2025 Update Here is an overview of the CIS Benchmarks that the Center for Internet Security (C... |
03/10 | The DevSecOps Capability Maturity Model Implementing DevSecOps can improve multiple aspects of the effectiveness of a soft... |
03/06 | NIST Finalizes Guidelines for Evaluating ‘Differential Privacy’ Gua... Using differential privacy can help organizations glean useful insights from datab... |
03/05 | Workshop on Foundational Cybersecurity Activities for IoT Device Ma... NIST will host a full-day workshop at the NCCoE to continue discussions related to... |
03/05 | Multiple vulnerabilities have been discovered in VMware ESXi, Works... Multiple vulnerabilities have been discovered in VMware ESXi, Workstation, and Fus... |
03/03 | Detection and Repair: The Cost of Remediation This year, we plan on making some exciting updates to the SEI CERT C Coding Standa... |
02/27 | Perspectives on Generative AI in Software Engineering and Acquisition It is essential that software and acquisition professionals learn how to apply AI-... |
02/26 | Celebrating 1 Year of CSF 2.0 It has been one year since the release of the NIST Cybersecurity Framework (CSF) 2... |
02/25 | NCSWIC Publishes Spring 2024 Bi-Annual Meeting Executive Summaries
|
02/24 | Protecting AI from the Outside In: The Case for Coordinated Vulnera... This post highlights lessons learned from applying the coordinated vulnerability d... |
02/19 | #StopRansomware: Ghost (Cring) Ransomware Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomw... |
02/17 | Introducing MLTE: A Systems Approach to Machine Learning Test and E... Machine learning systems are notoriously difficult to test. This post introduces M... |
02/12 | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary... Multiple vulnerabilities have been discovered in Google Chrome, the most severe of... |
02/12 | Multiple Vulnerabilities in Fortinet Products Could Allow for Remot... Multiple vulnerabilities have been discovered Fortinet Products, the most severe o... |
02/11 | Critical Patches Issued for Microsoft Products, February 11, 2025 Multiple vulnerabilities have been discovered in Microsoft products, the most seve... |
02/11 | Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrar... Multiple vulnerabilities have been discovered in Adobe products, the most severe o... |
02/11 | SAFECOM Publishes Spring 2024 SAFECOM Bi-Annual Meeting Executive S...
|
02/10 | Cyber-Informed Machine Learning This blog post proposes cyber-informed machine learning as a conceptual framework ... |
02/06 | A Vulnerability in Trimble Cityworks Could Allow for Remote Code Ex... A vulnerability has been discovered in Trimble Cityworks that could allow for remo... |
02/05 | CIS Benchmarks February 2025 Update Here is an overview of the CIS Benchmarks that the Center for Internet Security (C... |
02/04 | Multiple Vulnerabilities in Google Android OS Could Allow for Privi... Multiple vulnerabilities have been discovered in Google Android OS, the most sever... |
02/03 | Introducing the Insider Incident Data Exchange Standard (IIDES) Capturing and sharing information about insider incidents is a challenge. This pos... |