Security in the impending age of quantum computers

Quantum computing is poised to be one of the most important technologies of the 21st century. With global governments having collectively pledged more than $38 billion in public funds for quantum technologies and $2.1 billion of new private capital flo… Continue reading Security in the impending age of quantum computers

CISA sees increase in zero-day exploitation, official says

Michael Duffy, associate director for capacity building in CISA’s cybersecurity division, says that global zero-day exploits are “really affecting the federal government networks.”

The post CISA sees increase in zero-day exploitation, official says appeared first on CyberScoop.

Continue reading CISA sees increase in zero-day exploitation, official says

Former British Cyberespionage Agency Employee Gets Life in Prison for Stabbing an American Spy

Former British cyberespionage agency employee was sentenced in a London court for attempted murder, will have to serve at least 13 years in prison.
The post Former British Cyberespionage Agency Employee Gets Life in Prison for Stabbing an American Spy… Continue reading Former British Cyberespionage Agency Employee Gets Life in Prison for Stabbing an American Spy

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools

The StripedFly malware has APT-like capabilities, but remained unnoticed for five years, posing as a cryptocurrency miner.
The post Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools appeared firs… Continue reading Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools

New NSA Information from (and About) Snowden

Interesting article about the Snowden documents, including comments from former Guardian editor Ewen MacAskill

MacAskill, who shared the Pulitzer Prize for Public Service with Glenn Greenwald and Laura Poitras for their journalistic work on the Snowden files, retired from The Guardian in 2018. He told Computer Weekly that:

  • As far as he knows, a copy of the documents is still locked in the New York Times office. Although the files are in the New York Times office, The Guardian retains responsibility for them.
  • As to why the New York Times has not published them in a decade, MacAskill maintains “this is a complicated issue.” “There is, at the very least, a case to be made for keeping them for future generations of historians,” he said…

Continue reading New NSA Information from (and About) Snowden

ELITEWOLF: NSA’s repository of signatures and analytics to secure OT

Cyber entities continue to show a persistent interest in targeting critical infrastructure by taking advantage of vulnerable OT assets. To counter this threat, NSA has released a repository for OT Intrusion Detection Signatures and Analytics to the NSA… Continue reading ELITEWOLF: NSA’s repository of signatures and analytics to secure OT

Revealed! The top 10 cybersecurity misconfigurations, as determined by CISA and the NSA

A joint advisory from the United States’s National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) has shone a light on the top ten most common cybersecurity misconfigurations found in large private and public organisa… Continue reading Revealed! The top 10 cybersecurity misconfigurations, as determined by CISA and the NSA

NSA AI Security Center

The NSA is starting a new artificial intelligence security center:

The AI security center’s establishment follows an NSA study that identified securing AI models from theft and sabotage as a major national security challenge, especially as generative AI technologies emerge with immense transformative potential for both good and evil.

Nakasone said it would become “NSA’s focal point for leveraging foreign intelligence insights, contributing to the development of best practices guidelines, principles, evaluation, methodology and risk frameworks” for both AI security and the goal of promoting the secure development and adoption of AI within “our national security systems and our defense industrial base.”…

Continue reading NSA AI Security Center

Securing GitHub Actions for a safer DevOps pipeline

GitHub Actions provides a platform for continuous integration and continuous delivery (CI/CD), enabling your build, test, and deployment process automation. It allows you to establish workflows that build and test each pull request in your repository a… Continue reading Securing GitHub Actions for a safer DevOps pipeline