Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia

A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia.
“This sentence should serve as a stark warning to all those entrusted w… Continue reading Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia

Posted in Uncategorized

Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years

Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious “imageless” containers over the past five years, once again underscoring how open-source registries could pave the w… Continue reading Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years

Posted in Uncategorized

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence (AI)-related threats.
“These guidelines are informed by the whole-of-government effort to assess AI risks across all si… Continue reading U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

Posted in Uncategorized

Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected or remediated to address issues with access to sensitive data such as location or SMS messages over the past year.
The tech giant also said… Continue reading Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

Posted in Uncategorized

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to m… Continue reading Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Posted in Uncategorized