CyberSec News
- Ransomware incidents increase by 132%, vishing by 1,633% - March 26, 2025
- Security leaders discuss new phishing campaign targeting Mac users - March 25, 2025
- 5 aviation principles that elevate technical support leadership - March 25, 2025
- Rooted mobile devices are 250 times more vulnerable - March 25, 2025
- The future of security operations depends on AI agents, not LLMs - March 24, 2025
- Pennsylvania State Education Association announces data breach - March 24, 2025
- The importance of security for power utility substations - March 24, 2025
- 82% of all phishing emails utilized AI - March 24, 2025
- 56% of security teams say AI is crucial to daily operations - March 24, 2025
- Ballistic-resistant solutions for schools: Trends and best practices - March 24, 2025
- Nearly 22,000 impacted by Western Alliance Bank breach - March 21, 2025
- 14% of security leaders balance data security and business objectives - March 21, 2025
- New LLM jailbreak technique can create password-stealing malware - March 20, 2025
- Brand impersonation is 51% of browser phishing attempts - March 20, 2025
- Phishing campaign leverages Microsoft 365 infrastructure for attacks - March 20, 2025
Feeds
Windows Internals Blog
- Secure Kernel Research with LiveCloudKd - May 2, 2024
- Troubleshooting a System Crash - January 30, 2024
- KASLR Leaks Restriction - November 26, 2023
- Investigating Filter Communication Ports - January 4, 2023
- An End to KASLR Bypasses? - November 23, 2022
CISA
- #StopRansomware: Medusa Ransomware - March 11, 2025
- #StopRansomware: Ghost (Cring) Ransomware - February 19, 2025
- Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications - January 15, 2025
- Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization - August 2, 2024
- 2023 Top Routinely Exploited Vulnerabilities - November 8, 2024
US CERT
- CISA Releases Four Industrial Control Systems Advisories - March 25, 2025
- CISA Adds One Known Exploited Vulnerability to Catalog - March 24, 2025
- CISA Releases Five Industrial Control Systems Advisories - March 20, 2025
- CISA Adds Three Known Exploited Vulnerabilities to Catalog - March 19, 2025
- Supply Chain Compromise of Third-Party GitHub Action, CVE-2025-30066 - March 18, 2025
NIST
- NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption - March 11, 2025
- NIST Small Business Cybersecurity Webinar: Protecting Your Small Business from Phishing Risks - August 14, 2025
- CSF 2.0 Webinar Series: Implementing CSF 2.0—The Why, What, and How - March 20, 2025
- Open Industrial Digital Ecosystem Summit - April 8, 2025
- 5th High-Performance Computing Security Workshop - May 7, 2025