33rd Annual FISSEA Conference | Register today!
Register Now for the 33rd Annual FISSEA Conference 33rd Annual FISSEA Conference May 16, 2023 | 9:00am-4:30pm ET*...
Financial cyberthreats in 2022
Financial gain remains the key driver of cybercriminal activity. In the past year, we’ve seen multiple developments in...
Putting the consultancy community at its heart
Catherine H reflects on how the changes to the refreshed Assured Cyber Security Consultancy scheme go deeper than...
Issue #570 (March 28, 2023)
#570 – MARCH 28, 2023 Lessons Learned From Four Years Programming With Python What are the core lessons...
UK Sets Up Fake Booter Sites To Muddy DDoS Market
The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to...
Accelerating Data Center and HPC Performance Analysis with NVIDIA Nsight Systems
As the GPU launches threads, dispatches kernels, and loads from memory, the CPU feeds it data asynchronously, accesses...
Mass Revolution: Kibble Balances for All
NIST is working on a big project in a small package. When you want to weigh something –...
Improved Chip-Scale Color Conversion Lasers Could Enable Many Next-generation Quantum Devices
In two new studies, researchers at the National Institute of Standards and Technology (NIST) have greatly improved the...
Copy-paste heist or clipboard-injector attacks on cryptousers
It is often the case that something new is just a reincarnation of something old. We have come...
Cisco SD-WAN vManage Software Cluster Mode Cross-Site Request Forgery Vulnerability
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software when it is operating in cluster...
The tech helping driverless cars see round corners
A trial in London used existing street cameras to help an autonomous car navigate city streets. Source:: BBC...
What Are Foundation Models?
Foundation models are AI neural networks trained on massive unlabeled datasets to handle a wide variety of jobs...
AutoDMP Optimizes Macro Placement for Chip Design with AI and GPUs
Most modern digital chips integrate large numbers of macros in the form of memory blocks or analog blocks,...
Testing Infant Formula Nutritional Content
Infant formula is one of the most highly regulated foods in the United States and around the world....
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues Affecting Multiple Cisco Products
On March 27, 2023, the research paper Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues was made...
How scammers employ IPFS for email phishing
The idea of creating Web 3.0 has been around since the end of 2000s. The new version of...
Cisco IOS XE Software Privilege Escalation Vulnerability
A vulnerability in the Cloud Management for Catalyst migration feature of Cisco IOS XE Software could allow an...
Spotlight: Research Chemist Ileana Pazos’ Radiant Role in Longer-Lasting, Safer Imported Foods
Fruits and vegetables brought in from outside the country first require health and foodborne pathogen inspections. NIST research...
Understanding metrics to measure SOC effectiveness
The security operations center (SOC) plays a critical role in protecting an organization’s assets and reputation by identifying,...
Cisco IOS XE Software Virtual Fragmentation Reassembly Denial of Service Vulnerability
A vulnerability in the implementation of the IPv4 Virtual Fragmentation Reassembly (VFR) feature of Cisco IOS XE Software...