Spotlight: Understanding Human-Tech Interactions With Computer Scientist Shanée Dawkins

06/03/2023 0 Comments 0 tags

Meet Shanée Dawkins, a computer scientist whose expertise in the way people interact with technology extends in multiple directions, from phishing to public safety and beyond.

IOT Advisory Board Meeting

06/03/2023 0 Comments 0 tags

This second meeting of the IoT Advisory Board will focus on establishing the outline for the IoT Advisory Board’s report and report outs from sub-teams on the material that they

How Digital Twins Could Protect Manufacturers From Cyberattacks

06/03/2023 0 Comments 0 tags

Detailed virtual copies of physical objects are opening doors for better products across automotive, health care, aerospace and other industries.

5×5: The Public Safety Innovation Summit

06/03/2023 0 Comments 0 tags

5×5―the confirmation of a strong and clear signal. In 2023, it will also be a gathering place to make your voice heard and drive public safety communications forward. NIST PSCR

Immersive Test Center brings first responders advanced training, opportunities to overcome challenges

06/03/2023 0 Comments 0 tags

This blog is a repost from the First Responder Network Authority, originally published on March 2, 2023. One of the biggest training challenges for first responders is the ability to

Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPI

06/03/2023 0 Comments 0 tags

A malicious Python package uploaded to the Python Package Index (PyPI) has been found to contain a fully-featured information stealer and remote access trojan. The package, named colourfool, was identified by

2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots

06/03/2023 0 Comments 0 tags

As a primary working interface, the browser plays a significant role in today’s corporate environment. The browser is constantly used by employees to access websites, SaaS applications and internal applications,

New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers

06/03/2023 0 Comments 0 tags

Misconfigured Redis database servers are the target of a novel cryptojacking campaign that leverages a legitimate and open source command-line file transfer service to implement its attack. “Underpinning this campaign

Hackers Exploit Containerized Environments to Steal Proprietary Data and Software

06/03/2023 0 Comments 0 tags

A sophisticated attack campaign dubbed SCARLETEEL is targeting containerized environments to perpetrate theft of proprietary data and software. “The attacker exploited a containerized workload and then leveraged it to perform privilege escalation

U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities

06/03/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which emerged in the threat landscape last year. “After gaining access to victims’ networks, Royal actors disable