Latest News
Stay up to date with the latest posts and updates
Alerts
-
CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices
CISA—in partnership with international and U.S. organizations—released guidance to help organizations protect their network edge devices and appliances, such as firewalls, routers, virtual private networks (VPN) gateways, Internet…
4 min read
-
How the Mexican Drug Cartels Relate to Cybersecurity
Mexican drug cartels have adopted the same diversification strategies as successful business moguls like the investors of Shark Tank to safeguard their empires. They have ventured into 21st-century…
4 min read
-
Vulnerability Summary for the Week of January 27, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 0xPolygonZero–plonky2 Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. Lookup tables, whose length…
4 min read
-
Vulnerability Summary for the Week of January 13, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Campaign Management System Platform for Women A vulnerability was found in 1000 Projects Campaign Management System…
4 min read
-
History, Current Uses, and Future of Artificial Intelligence
Artificial Intelligence was theorized in 1956 by John Mcarthy. He got many of the core concepts right, but he was around seven decades off. Martin Bellman invented this…
4 min read
-
Beware of the Toll Lane Fee Text Scam
In an increasingly digital world, scams are becoming more sophisticated and challenging to identify. From Postal Service smishing attacks to IT helpdesk vishing attacks, it has been nearly…
4 min read