Latest Tech News

FISSEA Fall Forum: September 30, 2025 (No image available)

FISSEA Fall Forum: September 30, 2025

FISSEA is celebrating 38 years of working together and shaping the future. We have adopted the annual theme of “Collaborative Cybersecurity: Building a Community of Awareness and Action.” Quarterly Forums are designed to provide opportunities for
Sixth PQC Standardization Conference (No image available)
Upcoming Event!

Sixth PQC Standardization Conference

FULL CONFERENCE DETAILS NIST plans to hold the 6th PQC Standardization Conference from September 24-26, 2025 in Gaithersburg, Maryland. In August 2024, we published the first 3 post-quantum cryptographic standards, and work continues on additional
NIST NCCoE Cyber AI Profile Virtual Working Session Series: Thwarting AI-enabled Cyber Attacks (No image available)
Upcoming Event!

NIST NCCoE Cyber AI Profile Virtual Working Session Series: Thwarting AI-enabled Cyber Attacks

Join the NIST NCCoE soon for a series of virtual working sessions to provide input on the NIST Cybersecurity Framework (CSF) Cyber Artificial Intelligence (AI) Profile (“Cyber AI Profile). These will serve as a continuation of the April workshop and
NIST NCCoE Secure Software Development (DevSecOps) Virtual Event (No image available)
Upcoming Event!

NIST NCCoE Secure Software Development (DevSecOps) Virtual Event

Overview Join the NIST National Cybersecurity Center of Excellence (NCCoE) on August 27, 2025 for a virtual event dedicated to exploring Secure Software Development, Security, and Operations (DevSecOps) practices. This interactive event will showcase
Second Seminar on Building an In-Space Circular Economy (No image available)

Second Seminar on Building an In-Space Circular Economy

About the Event This event will be the second seminar in a series of events on building the in-space circular economy. The seminar will be an opportunity to hear from leading experts, practitioners, and representatives from government and academic
NIST NCCoE Cyber AI Profile Virtual Working Session Series: Conducting AI-enabled Cyber Defense (No image available)
Upcoming Event!

NIST NCCoE Cyber AI Profile Virtual Working Session Series: Conducting AI-enabled Cyber Defense

Join the NIST NCCoE soon for a series of virtual working sessions to provide input on the NIST Cybersecurity Framework (CSF) Cyber Artificial Intelligence (AI) Profile (“Cyber AI Profile). These will serve as a continuation of the April workshop and
NIST Small Business Cybersecurity Webinar: Protecting Your Small Business from Phishing Risks (No image available)
Upcoming Event!

NIST Small Business Cybersecurity Webinar: Protecting Your Small Business from Phishing Risks

Phishing is one of the most common types of cyber crime. These scams use convincing emails or other messages, such as text messages or social media messages, to trick users into opening harmful links, downloading malicious software, or submitting
How to Protect Yourself From Portable Point-of-Sale Scams (No image available)

How to Protect Yourself From Portable Point-of-Sale Scams

POS scams are difficult but not impossible to pull off. Here's how they work—and how you can protect yourself.
Google confirms data breach exposed potential Google Ads customers' info (No image available)

Google confirms data breach exposed potential Google Ads customers' info

Google has confirmed that a recently disclosed data breach of one of its Salesforce CRM instances involved the information of potential Google Ads customers. [...]
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices. "This allows remote attackers to inject keystrokes covertly and launch attacks independent of the host operating system," Eclypsium researchers Paul Asadoorian, Mickey Shkatov, and Jesse Michael said in a report shared with The Hacker News. The
Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models

Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models

Cybersecurity researchers have uncovered multiple security flaws in Dell's ControlVault3 firmware and its associated Windows APIs that could have been abused by attackers to bypass Windows login, extract cryptographic keys, as well as maintain access even after a fresh operating system install by deploying undetectable malicious implants into the firmware. The vulnerabilities have been codenamed
A Special Diamond Is the Key to a Fully Open Source Quantum Sensor (No image available)

A Special Diamond Is the Key to a Fully Open Source Quantum Sensor

Quantum sensors can be used in medical technologies, navigation systems, and more, but they’re too expensive for most people. That's where the Uncut Gem open source project comes in.
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model (LLM) GPT-5 and produce illicit instructions. Generative artificial intelligence (AI) security platform NeuralTrust said it combined a known technique called Echo Chamber with narrative-driven steering to trick the model into producing undesirable
60 malicious Ruby gems downloaded 275,000 times steal credentials (No image available)

60 malicious Ruby gems downloaded 275,000 times steal credentials

Sixty malicious Ruby gems containing credential-stealing code have been downloaded over 275,000 times since March 2023, targeting developer accounts. [...]
The US Court Records System Has Been Hacked (No image available)

The US Court Records System Has Been Hacked

Plus: Instagram sparks a privacy backlash over its new map feature, hackers steal data from Google's customer support system, and the true scope of the Columbia University hack comes into focus.