Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect SSL/TLS VPN Denial of Service Vulnerability
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities
Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense...
New Jamf CEO John Strosahl on Apple in the enterprise, Jamf’s future
John Strosahl became Jamf CEO in September. He isn’t a new face and was one of the first employees...
New Jamf CEO John Strosahl on Apple in the enterprise, Jami’s future
John Strosahl became Jamf CEO in September. He isn’t a new face and was one of the first employees...
Box taps Google Cloud’s generative AI capabilities to extract metadata
Cloud content management company Box and Google Cloud have announced an expansion of their partnership in an effort...
Researchers Expose Prolific Puma’s Underground Link Shortening Service
A threat actor known as Prolific Puma has been maintaining a low profile and operating an underground link shortening service...
NIST Research Leader Presents at First EU ROADVIEW Webinar
On October 2, 2023, NIST Research Leader Ed Griffor presented at the inaugural EU ROADVIEW Webinar “An Introduction...
NIST Updates Guide on Communications Standards to Federal Agencies
NIST released an updated version of its Interagency Report on Advanced Communication Technologies Standards which is a guide...
NIST Leader Presents on Smart Connected Systems Research and Standards
On October 20, 2023, NIST’s David Wollman, Deputy Chief of the Smart Connected Systems Division, presented on smart...
NIST Researchers Explain Software that Finds Inconsistencies in System Behavior Design
NIST’s Raphael Barbau and Conrad Bock were invited to present NIST-developed software that helps find inconsistencies in system...
NIST Engages Stakeholders in U.S. National Standards Strategy Business Roundtable in Detroit
On September 12, 2023, NIST held the first of several listening sessions designed to chart a path towards...
NIST Contributes to ISO Standard Enabling Product Data Interoperability
In October 2023, NIST researchers Allison Barnard Feeney, Rosemary Astheimer, and Sylvere Krima participated in a bi-annual meeting...
NIST Engineer Presents a STEP by Step Process to Evolve Digital Manufacturing
In September 2023, NIST’s Rosemary Astheimer presented on efforts capture and leverage product manufacturing information at the 2023...
Hands on Review: LayerX’s Enterprise Browser Security Extension
The browser has become the main work interface in modern enterprises. It’s where employees create and interact with...
Iranian Cyber Espionage Group Targets Financial and Government Sectors in Middle East
A threat actor affiliated with Iran’s Ministry of Intelligence and Security (MOIS) has been observed waging a sophisticated...
The best apps to restore the classic Windows Start menu and taskbar
Microsoft has made a lot of changes to the Start menu and taskbar over the past few years....
3 tough questions about Samsung’s Android 14 accomplishment
Well, my friends, hell has officially frozen over. Samsung, the company traditionally associated with slow and unpredictable Android...
North Korean Hackers Tageting Crypto Experts with KANDYKORN macOS Malware
State-sponsored threat actors from the Democratic People’s Republic of Korea (DPRK) have been found targeting blockchain engineers of...
Turla Updates Kazuar Backdoor with Advanced Anti-Analysis to Evade Detection
The Russia-linked hacking crew known as Turla has been observed using an updated version of a known second-stage...
Alert: F5 Warns of Active Attacks Exploiting BIG-IP Vulnerability
F5 is warning of active abuse of a critical security flaw in BIG-IP less than a week after...