Latest Tech News

‘Stupid and Dangerous’: CISA Funding Chaos Threatens Essential Cybersecurity Program (No image available)

‘Stupid and Dangerous’: CISA Funding Chaos Threatens Essential Cybersecurity Program

The CVE Program is the primary way software vulnerabilities are tracked. Its long-term future remains in limbo even after a last-minute renewal of the US government contract that funds it.
Here’s What Happened to Those SignalGate Messages (No image available)

Here’s What Happened to Those SignalGate Messages

A lawsuit over the Trump administration’s infamous Houthi Signal group chat has revealed what steps departments took to preserve the messages—and how little they actually saved.
Suspected 4chan Hack Could Expose Longtime, Anonymous Admins (No image available)

Suspected 4chan Hack Could Expose Longtime, Anonymous Admins

Though the exact details of the situation have not been confirmed, community infighting seems to have spilled out in a breach of the notorious image board.
Microsoft’s Recall AI Tool Is Making an Unwelcome Return (No image available)

Microsoft’s Recall AI Tool Is Making an Unwelcome Return

Microsoft held off on releasing the privacy-unfriendly feature after a swell of pushback last year. Now it’s trying again, with a few improvements that skeptics say still aren't enough.
NIST Updates Privacy Framework, Tying It to Recent Cybersecurity Guidelines (No image available)

NIST Updates Privacy Framework, Tying It to Recent Cybersecurity Guidelines

Targeted changes to content and structure respond to stakeholder needs and make the document easier to use.
The Most Dangerous Hackers You’ve Never Heard Of (No image available)

The Most Dangerous Hackers You’ve Never Heard Of

From crypto kingpins to sophisticated scammers, these are the lesser-known hacking groups that should be on your radar.
TraderTraitor: The Kings of the Crypto Heist (No image available)

TraderTraitor: The Kings of the Crypto Heist

Allegedly responsible for the theft of $1.5 billion in cryptocurrency from a single exchange, North Korea’s TraderTraitor is one of the most sophisticated cybercrime groups in the world.
Gamaredon: The Turncoat Spies Relentlessly Hacking Ukraine (No image available)

Gamaredon: The Turncoat Spies Relentlessly Hacking Ukraine

For the past decade, this group of FSB hackers—including “traitor” Ukrainian intelligence officers—has used a grinding barrage of intrusion campaigns to make life hell for their former countrymen and cybersecurity defenders.
Smishing Triad: The Scam Group Stealing the World’s Riches (No image available)

Smishing Triad: The Scam Group Stealing the World’s Riches

Millions of scam text messages are sent every month. The Chinese cybercriminals behind many of them are expanding their operations—and quickly innovating.
Open Industrial Digital Ecosystem Summit (No image available)

Open Industrial Digital Ecosystem Summit

The Open Industrial Digital Ecosystem Summit is an annual event bringing together thought leaders, experts, practitioners, developers, and users of standards for data semantics. The event is co-hosted by the Systems Integration Division of the
macOS Security Compliance Project Developer Conference (No image available)

macOS Security Compliance Project Developer Conference

The National Institute of Standards and Technology will host a developer conference on Tuesday, March 25, and Wednesday, March 26, 2025. The event will focus on the macOS Security Compliance Project (mSCP) and is tailored for vendors developing
CSF 2.0 Webinar Series: Implementing CSF 2.0—The Why, What, and How (No image available)

CSF 2.0 Webinar Series: Implementing CSF 2.0—The Why, What, and How

Registration has reached capacity for this event. A recording will be posted to this page after the event. To address the ever-evolving cybersecurity landscape and equip organizations with information and resources to more quickly and effectively
NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption (No image available)

NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption

The new algorithm will serve as a backup for the general encryption needed to protect data from quantum computers developed in the future.
NIST Finalizes Guidelines for Evaluating ‘Differential Privacy’ Guarantees to De-Identify Data (No image available)

NIST Finalizes Guidelines for Evaluating ‘Differential Privacy’ Guarantees to De-Identify Data

Using differential privacy can help organizations glean useful insights from databases while protecting individuals’ data.
Workshop on Foundational Cybersecurity Activities for IoT Device Manufacturers (No image available)

Workshop on Foundational Cybersecurity Activities for IoT Device Manufacturers

NIST will host a full-day hybrid workshop at the NCCoE to continue discussions related to a major update of NIST IR 8259. The day's activities will feature an overview of NIST's current status in updating NIST IR 8259 with extensive Q-and-A and