Decision to Revise FIPS 180-4, Secure Hash Standard (SHS)
In June 2022, NIST’s Crypto Publication Review Board initiated a review process for Federal Information Processing Standard (FIPS) 180-4, Secure…
In June 2022, NIST’s Crypto Publication Review Board initiated a review process for Federal Information Processing Standard (FIPS) 180-4, Secure…
High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a Chinese threat actor…
The ending of a Scream movie is always the best part. It’s what you’ve been waiting for: the reveal of…
Security researchers warn of hacking attempts in the wild exploiting critical vulnerabilities in VMware NSX Manager. Cyber security firm Wallarm…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog,…
Megan Amdahl is Senior Vice President of Partner Alliances & North America Transformation at Insight, a solutions integrator company that…
The Federal Trade Commission has been on a mission to compel Twitter to turn over internal communications and documents related…
Researchers discovered a new info stealer dubbed SYS01 stealer targeting critical government infrastructure and manufacturing firms. Cybersecurity researchers from Morphisec…
What is extended detection and response (XDR)? There is a lot of confusion as to what XDR is, and some…
What’s better than a tale of vampiric horror? A tale of old-timey vampiric horror, and one of the hunter becoming…