• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact Us
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • Core Analysis Task (CAT) Program
    • Subject Matter Expert (SME) Network
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
  • About
    • About the CSIAC
    • The CSIAC Team
    • Subject Matter Expert (SME) Support
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • DTIC STI Program
    • FAQs
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
/ Sitemap

Sitemap

  • Pages

    • 508 Compliance and Accessibility Information
    • About
      • About the CSIAC
      • DTIC’s IAC Program
      • DTIC’s R&E Gateway
      • FAQ’s
      • Free Inquiries and Core Analysis Task (CAT) Program
      • Scientific and Technical Information
      • The CSIAC Team
    • Acronym DB
    • All CS Digest Sections
    • CALL FOR PAPERS – 2019 Modeling and Simulation Special Edition of the Journal of Cyber Security & Information Systems
    • Community
    • CS Digest Poll – Thank You
    • CSIAC Journal – Call for Papers for Publication
    • CSIAC Journal Article Submission Policy
    • CSIAC Terms of Use
    • CSIAC Webinar – Applying the Top 20 Critical Controls for Risk Assessment – Chat Log
    • CSIAC Webinar – eMASS, the True Story – Chat Log
    • CSIAC Webinar – Leveraging Machine Learning – Chat Log
    • Cyber COI – Documents
      • Cyber COI – 4+2 S&T Taxonomy
      • Cyber COI – Cyber S&T Capability Framework
      • Cyber COI – Engagement Opportunities
      • Cyber COI – S&T Priority Gaps
    • Cyber COI – Service Point of Contact Information
    • Cyber Community of Interest (CoI) Study on Technology Future and Science & Technology Investment: Survey for Industry
    • Cybersecurity Awareness Month – October 2020
      • If You Connect It, Protect It
      • Securing Devices at Home and Work
      • Securing Internet-Connected Devices in Healthcare
      • The Future of Connected Devices
    • Data Privacy Day – Business and Organization Resources
    • Data Privacy Day – Consumer Resources
    • Data Privacy Day – Fostering a Culture of Privacy Awareness at Work
    • Data Privacy Day – January 28
    • Data Privacy Day – The Internet of Me
    • Director’s Update – January 2021
    • Director’s Update – November 2020
    • Go Paperless – CSIAC Journal
    • Groups
    • Home
    • Inquiry Survey Form
    • Members
    • National Cyber Security Awareness Month – October 2017
      • Cybersecurity in the Workplace is Everyone’s Business – National Cyber Security Awareness Month – Week 2: October 9-13
      • Protecting Critical Infrastructure from Cyber Threats – National Cyber Security Awareness Month – Week 5: October 30-31
      • Simple Steps to Online Safety – National Cyber Security Awareness Month – Week 1: October 2-6
      • The Internet Wants YOU: Consider a Career in Cybersecurity – National Cyber Security Awareness Month – Week 4: October 23-27
      • Today’s Predictions for Tomorrow’s Internet – National Cyber Security Awareness Month – Week 3: October 16-20
    • National Cyber Security Awareness Month – October 2018
      • It’s Everyone’s Job to Ensure Online Safety at Work – National Cyber Security Awareness Month – Week 3: October 15-19
      • Make Your Home a Haven for Online Safety – National Cyber Security Awareness Month – Week 1: October 1-5
      • Millions of Rewarding Jobs: Educating for a Career in Cybersecurity – National Cyber Security Awareness Month – Week 2: October 8-12
      • Safeguarding the Nation’s Critical Infrastructure – National Cyber Security Awareness Month – Week 4: October 22-26
    • National Cyber Security Awareness Month (NCSAM) – October 2019
    • News
    • Privacy and Security Notice
      • Example Information Collected for Statistical Purposes
    • Resources
      • Certifications
      • CSIAC Reports
      • Cybersecurity Related Websites
      • Standards & Reference Documents
      • The DoD Cybersecurity Policy Chart
        • Changelog for The DoD Cybersecurity Policy Chart
      • Topic Tags
    • Services
      • Contact
      • Core Analysis Task (CAT) Program
      • CSIAC Training
        • Foundational Cyber Training
      • Subject Matter Expert (SME) Network
      • Submit a Technical Inquiry
    • Set Subscription
    • Sitemap
    • Site-Wide Activity
    • Software Model Repository (SWMR) Has Been Discontinued
    • Subject Matter Expert (SME) Application Form and Questionnaire
    • Subject Matter Expert (SME) Application Submitted
    • Subscription Manager
    • Thank you for subscribing!
    • The ROI Dashboard and SLED Have Been Discontinued
    • We Work For Your Business
  • Forums

    • Groups Forums
      • Cybersecurity
      • Knowledge Management & Information Sharing
        • Protecting Controlled Unclassified Information
      • Modeling & Simulation
      • Software Intensive Systems Engineering
  • Topics

    • Cyber World War (Information World War)
    • Which Part of Incoming “IPV4 Packet” is compared with “virus Signature”
    • Data Privacy – Regulations for Business
    • Data Privacy – Online Learning and Child Privacy
    • Data Privacy – Personal Data Hygiene
    • Data Privacy – Own Your Privacy
    • Why is disaster recovery important?
    • Sunburst Malware are being use to Target Government around the world !
    • The Binary Security story: A cybersecurity startup run out of Darwin
    • Best universities for MSc degree in Cyber Security in Europe
    • Hacker targeted military component unit!
    • K-12 Attacks
    • Tech unicorn UiPath discloses data breach
    • Hacker are taking advantage of WinZip and causing trouble
    • How can schools protect their systems during COVID-19
    • FireEye
    • Interested to know the AI tools for continuous monitoring
    • Educational System is Not Ready For The Next Age Of Learning
    • What metrics or measurements qualifies a cybersecurity program as effective?
    • Cybersecurity trends and threats that we will see against FI’s?
    • Cyber Security financial sector resources
    • The future of privacy law and its impact on global business behaviour
    • TikTok sale deadline elapses as negotiations with US continue
    • Huntsville City Schools Experience Ransom
    • Kmart Have Been Infiltrated
    • Zoom Impersonation Attacks Aim to Steal Credentials
    • iPhone Bug Allowed for Complete Device Takeover Over the Air
    • Facebook Messenger Bug
    • IT-ISAC and ISACA Form Strategic Partnership to Collaborate on Cyber Initiative
    • researchers discover method of exploiting robotic vacuums to gather audio data
    • Justice department lawsuit against google
    • The worst passwords of 2020 show we are just as lazy about security as ever!
    • Waves of attacks on US hospitals show a change in tactics for cybercriminals
    • 7 Cyber Security Predictions for the Upcoming Year
    • "6 Cybersecurity Tips For Remote Workers"
    • COVID-19 app leaked peoples healthcare info
    • Five Emerging Cyber-Threats to Watch Out For in 2021
    • Platypus Attack Abuses RAPL Mechanism to Steal Data from Intel CPUs
    • Hackers steal over 83 million dollars worth of content
    • Hackers attempt to target covid 19 vaccine
    • Microsoft says three APTs have targeted seven COVID-19 vaccine makers
    • Platypus Attack Abuses RAPL Mechanism to Steal Data from Intel CPUs
    • CISA Director Expects to be Fired
    • Pros digging into the dark web to try and be like the bad guys
    • The Effects of a Pandemic on Cyber Threats
    • Windows Zero Day Attack
    • Play Store identified as main distribution vector for most Android malware
    • Google and Mozilla fixed issues exploited at 2020 Tianfu Cup hacking contest
    • DHS Senior Cyber Security Official is Stepping Down
    • Animal Jam Was Hacked
    • "Gotham Joker": Malware
    • Australian government warns of possible ransomware attacks on health sector
    • Uncovered: APT 'Hackers For Hire' Target Financial, Entertainment Firms
    • Nintendo victim to credential stuffing attack
    • Lifelab breach in Canada
    • Alabama's second cyber attack
    • Microsoft Pushes 112 Patches
    • Ransomware attacks grow more menacing during the pandemic, creating headaches in
    • No Hacks on Election Day, But Pros are Still Prepared
    • Google Calls Out Windows on Vulnerability That Remains Unpatched
    • What does Big Tech know about you? Basically ALL your personal data
    • FBI Warns Against Using Hotel Wi-Fi for Work
    • Windows 10, iOS, Chrome, Firefox and Others Hacked at Tianfu Cup Competition
    • COVID-19 App Sharing Private Info
    • New Google Drive Scam Being Sent Out
    • Ghimob Malware Targets Android Apps
    • Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered
    • Divisive political climate stirs up hacktivist activity
    • FTC orders Zoom to implement stricter security standards
    • The pandemic brings new risk, even as nature of cyber threats remain pretty fami
    • Fake Microsoft Teams updates lead to Cobalt Strike deployment
    • Army launches ‘Hack the Army 3.0’ with more targets for cybersecurity researcher
    • North Korea Hackers Use Spyware in Job Offers
    • CyberSecurityWebTest
    • Gitpaste-12 Worm Targets Linux Servers, IoT Devices
    • Update Your iOS Devices Now 3 Actively Exploited 0-Days Discovered
    • New Malware Gitpaste-12 Worm
    • Google patches two zero days in Chrome
    • Ransomware attack toys with Mattel systems, data
    • Cyberattacks: Just How Sophisticated Have They Come?
    • Apple Patches Three Major Bugs
    • Cyber Security as Competitive Advantage
    • North Korean Hackers Use Spyware
    • Cyber Threats Revolving Around Coronavirus Outbreak
    • New "Zoom Snooping" Can Deduce What You Type Based on Shoulder Movements
    • Officials staying Preparing After the Recently Calm Voting Process
    • Facebook and TikTok block hashtags used to spread election conspiracy theories
    • Office 365 Phishing Scam
    • "more states now have paper trails to verify votes were counted"
    • Air Force deploys commercial IT capability
    • Russian hacker group targeted state Democratic parties in repeat of 2016 attacks
    • Emails Try To Scam People
    • Cybersecurity threats to corporate America are present now ‘more than ever,’ SEC
    • Office 365 Phishing Images
    • VMware Fixes Remote Code Execution Vulnerability
    • Google Drive’s Collaboration Feature is Being Exploited by Hackers
    • mTLS 1.2 vs 1.3
    • Microsoft Games Can Be Used For Privilege's On Windows
    • Hacker in Iranian are being sponsored to steal voter data in the US
    • Cyber Attack Maps to See Digital Threats
    • New Chrome Zero-Day Under Active Attacks – Update Your Browser
    • 23,600 Hacked Databases leak from unused data breach index site.
    • Fake COVID-19 Test Result Email Drops King Engine Ransomware
    • Iranian Hackers using Spoofed Emails to Steal Election Data
    • New Haven, CT filed over $200k for former employee’s data theft
    • Why Cyber Security Is Still So Complex
    • Suspected Chinese Hackers Unleash Malware That Can Survive OS Reinstalls
    • $100 Million Botnet Scheme Gets Cybercriminal 8 Years of Jail
    • Wroba Mobile Banking Trojan Spreads to the U.S. via Texts
    • WordPress Patches 3-Year-Old High-Severity RCE Bug
    • Inside an Attempted Election Hack: A US Cybersecurity Operative Tells All
    • Browser Bugs Exploited to Install 2 New Backdoors on Targeted Computers
    • Ransomware alert. Cybersecurity's "water treatment model." Managing and transfer
    • Trump Campaign Website Is Defaced by Hackers
    • Retirees wins back money scammed on PayPal-UPS scam site
    • Can automated penetration testing replace humans?
    • FBI Warns U.S Hospitals of Imminent Ransomware
    • Cyberattacks Cause Massive Network Outage at UVM
    • Data Security- What is it? Why does it matter? Why should I care?
    • The police can probably break into your phone…
    • Scammers are spoofing bank numbers to rob people
    • "Election operations are holding up so far against a wave of hacks…"
    • Hackers steal 2.3 million from Wisconsin Republican Party
    • Tennessee National Guard Aids in Nashville during Election
    • COVID-19 vaccine cyber security data attack
    • Trump says nobody gets hacked, gets hacked twice in one week
    • Federal Agencies warn hackers targeting U.S. hospitals with ransomware attacks
    • Coronavirus-Related Cyberattacks Still A Major Threat
    • McAfee Brands Are Being Abused
    • COVID-19 Impact on Bug Bounty
    • Facebook “copyright violation” tries to get past 2FA – don’t fall for it!
    • Government taking caution against Election Day Hacks
    • Medical Records of 3.5 Million U.S. Patients Can be Accessed and Manipulated by
    • Russian Hackers Stealing U.S. Government Data
    • Zoom End-to-End Encryption
    • Hundreds of Irrigation Systems Left Exposed With Default Settings In Israel.
    • The 5 biggest cybersecurity threats for the healthcare industry
    • Cybersecurity company finds hacker selling info on 186 million U.S. voters
    • FBI: Hackers stole government source code via SonarQube instances
    • Working From Home Increases Cyber Security Threats
    • US blames Iran for spoofed Proud Boys emails
    • Hackers hold patient info for ransom in psychotherapy data breach
    • Atos acquires sec consult
    • British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers’ Data
    • Pharma Company Leaks Customer Information
    • Trump's Campaign Website Hacked
    • FBI: Hackers stole government source code via SonarQube instances
    • Russian State-Sponsored Attacks
    • Russian Intelligence Officers Wanted By The FBI
    • Nvidia warns people of severe driver flaws
    • 'Among Us' Mobile Game Security Concerns
    • 12 Cyber Threats That Would Wreak Havoc on the Election
    • Machine-learning technique from Sandia Labs could improve fusion energy outputs
    • Hackers Hit Yorktown and Croton School Districts
    • DoD/CJCS/NIST guidance on SOP for Handling data received from outside orgs
    • Microsoft aggressively targets Botnet servers
    • Cybersecurity And The Remote Classroom
    • Nvidia issues fixes for exploits in geforce experience app
    • French IT Firm Affected by Ransomware Attack
    • Cybersecurity Awareness Month 2020: Overcoming new threats
    • Trustwave find hacker selling 186 million US voters Information
    • I Hacked Trump’s Twitter by Guessing Password
    • 50 million artificial neurons to facilitate machine-learning research at Sandia
    • New Chrome 0-day Under Active Attacks – Update Your Browser Now
    • New Popular Game Receives Controversy over "Spyware"
    • New Windows T-RAT, Controllable from anywhere using a Telegram Channel.
    • Oracle releases large bug fix.
    • U.S. Charges 6 Russian Intelligence Officers Over Destructive Cyberattacks
    • NSA Reveals the Top 25 Vulnerabilities Exploited by Chinese Nation-State Hackers
    • Egregor Claims Responsibility for Barnes and Noble Attack
    • Cybersecurity firm finds hacker selling info on millions of U.S. voters
    • Covid-19 Scams Not Dead Yet
    • United Kingdom Accuses Russia of Hacking the 2020 Olympics
    • Fake McAfee Software
    • Russian Who Hacked LinkedIn, Dropbox Sentenced to 7 Years in Prison
    • Sina Weibo
    • Quora Breach
    • UK Investigates DNS hijacking
    • Capitol One Data Breach
    • Google’s Waze Can Allow Hackers to Identify and Track Users
    • How to ensure your SaaS solutions are secure
    • US indicts Sandworm, Russia's most destructive cyberwar unit
    • Russian cyber-attack spree shows what unrestrained internet warfare looks like
    • $1M Cyber Resiliency Fund launched to support security ops impacted by pandemic
    • Discord desktop app vulnerability chain triggered remote code execution attacks
    • The ransomware ‘industry’ is becoming more commercial and professional than ever
    • Critical Magento Holes Open Online Shops to Code Execution
    • Ghanaians Need to be Privacy Conscious
    • Carnival Corp. Ransomware Attack Affects Three Cruise Lines
    • Barnes & Noble under goes a cybersecurity attack
    • Intcomex Data Breach
    • Twitter breach leads to cybersecurity rules for social media giants
    • Fitbit Spyware Steals Personal Data via Watch Face
    • Hackers target US Census Bureau network
    • Microsoft seeks to disrupt Russian criminal botnet
    • Cyber hacktivism or Cyber espionage? NATO documents found
    • Credit card security compliance declines for third consecutive year
    • Miami-based tech company suffers massive 1TB customer and business data leak
    • Chinese APT Group Targets Media, Finance, and Electronics Sectors
    • Bluetooth Flaw in Linux Systems
    • Phishers Capitalize on Headlines with Breakneck Speed
    • "8 Cybersecurity career options in high demand"
    • As attackers evolve their tactics, continuous cybersecurity education is a must
    • TikTok Launches Bug Bounty Program as Part of Expanding Threat Disclosure
    • Barnes & Noble confirms cyberattack, suspected customer data breach
    • "NitroHack" Steals Your Discord Info
    • FIFA 21 game scams: watch out for unsporting conduct
    • Robinhood Internal Probe Finds Hackers Hit Almost 2,000 Accounts
    • Twitter has experienced a major outage, with users across the world affected.
    • Universities Targeted
    • Microsoft Patch Tuesday fixes 87 flaws, 11 critical
    • Microsoft and Other Tech Companies Take Down TrickBot Botnet
    • The Important Difference Between Cybersecurity And Cyber Resilience
    • FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware
    • FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware
    • TikTok expands disclosure efforts on cybersecurity threats
    • Trickbot is Forced Offline in Major Cyber Security Victory
    • TikTok expands disclosure efforts on cybersecurity threats
    • CISA and FBI are aware of an Iran-based cyber actor targeting U.S networks
    • Police Raid German Spyware Company
    • Government Agencies and Networks Face Constant Barrage of Attacks
    • Google warns of a severe bluetooth flaw 'Bleedingtooth' in Linux Kernel.
    • US Joins Six Countries for Encryption Access
    • Hackers Target the Election
    • Soldier Center’s new fabric will enhance cybersecurity
    • Microsoft and Other Tech Companies Take Down TrickBot Botnet
    • Fitbit Spyware Steals Personal Data via Watch Face
    • Facebooks Bug Bounty Program
    • Fitbit Stealing Private Information
    • How CISOs Can Address Cyber Security Challenges From COVID-19
    • learn how to protect yourself from hackers
    • Teasing Secrets of Trump COVID Diagnosis Helps Phishing Scam
    • Companies opting out of DHS threat-sharing platform call for better data
    • An inside look at how ransomware groups go stealth
    • Facebook Page Hack
    • Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks
    • Hacking group discovers major security flaws in apple
    • Industrial Cyberattacks Get Rarer but More Complex
    • Apple Bug Bounty Program Leads to Discovery of Critical iCloud Exploit
    • Why the Recent Spike in Android apps Violating Google's ad Policy
    • Microsoft announces new initiatives to promote cybersecurity awareness
    • Cyber-avengers protecting hospitals from ransomware
    • Fullz House Hacker Group Hacked Mobile Provider to Steal Credit Card Data
    • Phishing attack spoofs IRS COVID-19 relief to steal personal data
    • Tesla accuses employee of Californian factory sabotage
    • More Than 1000 Air Force Cyber Security Workers Transfer to Space Force
    • Android ransomeware is becoming more advanced
    • Google are stepping up their security to protect gmail user from hacker
    • New Wireless Arlo Cameras
    • New Security Alerts For Gmail Users
    • Microsoft Azure Vulnerability's
    • "3 ways criminals use artificial intelligence in cybersecurity attacks"
    • Amazon Prime Day Spikes Phishing
    • Tyler Technology's
    • 3 ways criminals use artificial intelligence in cybersecurity attacks
    • 55 Apple Vulnerabilities discovered by group
    • Israeli Startup Changing the Landscape of Cyber Security for the Better
    • A Cybersecurity Checklist For The New Norm
    • Cyber Security Awareness Month
    • COVID-19 Clinical Trials Slowed After Ransomware Attack
    • Watch Out! Hackers are After Legacy Software
    • Phishing attack spoofs IRS COVID-19 relief to steal personal data
    • 'Mercenary' hacker group runs rampant in Middle East, cybersecurity research sho
    • Increase in phishing attachments, infected with Emotet Botnet trojan.
    • Food Delivery Service Chowbus Exposes 800,000 Customer Records
    • New 'MosaicRegressor' UEFI Bootkit Malware Found Active in the Wild
    • DoD takes steps to safeguard supply chain
    • You might think computer mouse are harmless, but is not.. here's why!
    • Hackers attack Nevada school district, publish social security numbers online
    • Banks Urged To Prepare For Surge In Cyberattacks
    • Amazons palm reading starts in grocery stores
    • Disappearing Covid-19 app alerts cause alarm
    • Video-Game Piracy Group ‘Team Xecuter’ Leaders in Custody
    • ePlus launches CyberSmart Initiative for Cyber Security Awareness Month
    • Facebook Malware that took over accounts and placed scammy ads a growing risk
    • Private Information Exposed After Ransomware Attack.
    • Phishing pages leverage CAPTCHAs to fool users, evade detection
    • Cyber-security firm McAfee files for IPO
    • MGM Data Dump
    • Trick and No Treat in the Google Play Store – 10/05/2020
    • VISA reports new strains of point-of-sale (POS) malware
    • Why does your business need cyber-security consultancy services?
    • Twitter Hack
    • Russian Who Hacked LinkedIn, Dropbox Sentenced to 7 Years in Prison
    • Years-Long ‘SilentFade’ Attack Drained Facebook Victims of $4M
    • Joker Trojan
    • Hacker from Russia Sentenced for Stealing Information from LinkedIn
    • Cybersecurity researcher hacks smart coffee maker with ransomware, uses it to as
    • County election computer networks still vulnerable to cyberattacks
    • Twitter removed around 130 Iranian accounts for interference in US Presidential
    • Madison City allows $200,000 budget for Cyber Security
    • The Evolution of Cybersecurity Threats During COVID-19 and What You Can Do About
    • Industrial Cyberattacks Get Rarer but More Complex
    • H&M Fined 41 million in Data Protection Scandle
    • Twitter Hires a New Cyber Security Chief after a Devastating Breach
    • Google removed this week 17 Android apps from its Play Store because they were i
    • Russian Sentenced to Prison for Hacking LinkedIn, Dropbox
    • Facebook Small Business Grants Spark Identity-Theft Scam
    • NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk
    • MVHS intrusion (Still developing)
    • Cyber-security Hacks Smart Coffee Maker
    • 61% of business don't apply basic password securities
    • Foreign Hackers Cripple Texas County’s Email System, Raising Election Security C
    • "Cybersecurity Awareness Month: Train employees to be first line of defense"
    • IPStorm Botnet Affects Windows,Android,Mac,Linux Machines.
    • BlackTech: A Hacking Group with a Busy Agenda
    • Paper to pen for emergency workers
    • Large Attack On Medical Chain
    • Cyber attack hits major hospitals
    • Ransomware attack on one of US’s largest healthcare systems
    • A Patient Dies After Ransomware Attack Paralyzes German Hospital Systems
    • Nebraska Med. Cyber Attack Update
    • A patient died after a Ransomware attack hit a hospital
    • SMS scam are still a thing and is still dangerous. Here’s why!
    • Iranian Hackers Run Rampant
    • Instagram bug made users vulnerable to hackers, cybersecurity firm claims
    • Nebraska Medicine Postpones Appointments due to Security Issues
    • TikTok says suicide video was part of ‘coordinated attack’
    • Hackers in Iran attempting to cause chaos.
    • "Just 44% of Healthcare Providers Meet NIST Cybersecurity Standards"
    • U.S. Secret Service looks to private sector to boost financial cybercrime probes
    • Twitter prepares for US election with new security training, pen testing
    • New Variants of Cross-platform FinSpy Now Target Mac and Linux Users
    • Foreign Hackers Cripple Texas County’s Email System, Raising Election Security C
    • Here’s why most Americans are not able to vote online in 2020
    • Amazon's New Palm Reading Tech
    • Vaclav Havel Airport in Prague Opens New Cybersecurity Center
    • After breach, Twitter hires a new cybersecurity chief
    • Fortinet VPN leaves businesses exposed
    • Angelo State gets NSA grant for cyber security program
    • Microsoft servers still open for exploited flaw
    • Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity
    • Source Code of Windows XP Leaked
    • North American Users Lost Microsoft 360 Access
    • Chinese hackers hacking usa government systems
    • Annual Tennessee National Guard Cyber Security Event
    • Canva Breach
    • Social Media Data Leaks
    • Only 10% of IT professionals have the cyber security skills needed in EU
    • Instagram flaw shows importance of managing third-party apps, images
    • ARE-ON partners with CRITICALSTART for cybersecurity protection
    • CISA & EAC Develop Risk Profile Tool for Election Officials
    • Ring’s Flying In-Home Camera Drone Escalates Privacy Worries
    • "‘We are outnumbered’ — cybersecurity pros face a huge staffing issue"
    • A New Hacking Group Hitting Russian Companies With Ransomware
    • Major Instagram App Bug Could've Given Hackers Remote Access to Your Phone
    • Practical Steps to Better Prepare for Potential Attacks
    • Major Bug in Instagram Could've Gave Hackers Remote Access to Your Phone
    • Group Member From The Dark Overlord Gets Sentenced to Five Years in Prison
    • Gaming Industry has been attack in the worst way possible. Here is why!
    • After Six Long Years, a New "Kitten" is Finally Out of the Hat
    • Gamer Credentials Now a Booming, Juicy Target for Hackers
    • GCA Releases Updated Cybersecurity Toolkit for Small Businesses
    • Alien Android Banking Trojan Sidesteps 2FA
    • India’s COVID-19 surveillance tool exposed millions of user data
    • Hackers Earn Millions From Popular Video Game through In Game "Skins"
    • Google rolls out new automated threat detection tool
    • Hackers attack Russian Businesses with TinyCryptor Ransomware.
    • Unsecured Microsoft Bing Server Exposed Users' Search Queries and Location
    • Firefox for Android Vulnerability
    • Cybrary Survey Finds Skill Gap Threatens Job Effectiveness
    • Three Cyber Security Actions Companies Should Take for Long-Term Remote Work
    • ActiVision Accounts Hacked- 500,000 Call Of Duty Players Could Be Affected
    • FBI hopes a more aggressive cyber strategy will disrupt foreign hackers
    • Hackers Continue to Interfere with Online Schooling
    • The first death resulting from a cyberttack on healthcare infrastructure
    • Patient Dies in German Hospital Because of Ransomware Attack
    • German Woman Dies due to Cyber Attack
    • Iran and China Exploit Similar Flaws at the Same Time.
    • Hacker aim for politicians account on twitter
    • Oracle will inherit TikTok security, privacy headaches
    • The TikTok Ban: Security Experts Weigh in on the App’s Risks
    • Five Chinese Hackers Charged by The U.S.
    • Iran-Based Threat Actor Exploits VPN Vulnerabilities
    • DOD Works to Increase Cybersecurity for U.S., Allies
    • CISA,FBI working with industry to make it ‘more painful’ for hackers to function
    • Man Pleads Guilty to Role in $600K Malware Protection Scam
    • What the Zerologon vulnerability means for the state of enterprise security
    • Zoom Security Upgrade
    • iranian hackers indicted.
    • BlueKai breach
    • Covid-19 is accelerating digital transformation of Cyber-security
    • IBM, AI And The Battle For Cybersecurity
    • Newcastle University cyber attack
    • "Hackers for China have successfully compromised US government systems…"
    • FBI Releases Cybersecurity Advisory on Undisclosed Iranian Malware
    • Security Training Email Phishing Campaign
    • Dunkin' Donuts Cyber Security Hole Result in $650,000 Fines
    • "Hackers Continue Cyberattacks Against, Catholic Orgs"
    • Dunkin' Donuts' hole in cybersecurity costs $650,000 in fines
    • Former Australian PM Information Leaked.
    • Microsoft Vulnerability Exposed
    • WhatsApp study on security how unsafe it really is.
    • A New macOS Malware Variant is going unnoticed by antivirus scanners
    • Trump administration rolls out policy to secure outer space technologies against
    • Staples Data Breach
    • Server Misconfiguration Leaks Personal Info from Razer
    • Two people caught for defacing US websites after Iranian general died.
    • Accidental Airbnb account takeover linked to recycled phone numbers
    • Development Bank of Seychelles (DBS) Hit by Ransomware
    • TikToc Fixes Flaw that Opened Android App to Compromise
    • Fairfax County Public Schools Computers Attacked
    • Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits
    • Attacks on Linux Servers are Rising Like a Rocket
    • 46,000 veterans impacted by VA data breach
    • Chinese intelligence hackers target U.S. government network
    • Security researchers slam Voatz brief to the Supreme Court on anti-hacking law
    • With election cybersecurity experts in short supply, some states call in the Nat
    • Russia, China and Iran launched cyberattacks on presidential campaigns, Microsof
    • APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins
    • Cybersecurity Companies Expose Sensitive Data Online
    • New Bluetooth Flaw Can Help Hackers Easily Target Nearby Devices
    • TLS Encryption With Timed Attacks
    • Gaming Community A Target For Cyber Criminals
    • A New Type of Linux Malware Steals Call Details
    • Gaming Community A Target For Cybercriminals
    • A Company hijacked 28,000 unsecured printers to raise awareness
    • Microsoft Warns of Cyberattacks on Trump, Biden Election Campaigns
    • Cyber security poses threat to East Tennessee virtual schools
    • Cyber attack On Thailand Hospitals
    • "Creating a Cybersecurity Culture starts with your team"
    • Hospitals in Thailand Targeted by Ransomware Attacks
    • Cost of Cybercrime Study
    • Fake Login Pages Mess With Big Name Brand Tech Companies.
    • Spyware Labeled ‘TikTok Pro’ Exploits Fears of U.S. Ban
    • most enterprises have had cybersecurity breaches.
    • cybersecurity costs should be taken into consideration during m&a deals
    • United Airlines Leaks Data
    • Hackers Stole $5.4 Million From Eterbase Cryptocurrency Exchange
    • Raccoon attacks break TLS encryption Under Certain Conditions
    • Raccoon attack can break TLS encryption Under Certain Conditions
    • Hackers Target School Districts
    • Finding Out The Data Breach Costs Before it Happens
    • A new app that tracks COVID-19 is raising privacy questions
    • MAZE Ransomware Group Attacks US School System
    • Facial Recognition Ban In Portland
    • Personal information possibly exposed in NorthShore data breach
    • Japan cybersecurity minister admits he has never used a computer
    • United Airlines’ website bug exposed traveler ticket data, 09.10.2020
    • Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles
    • Zoom Passwords up for Sale on the Dark Web
    • National Guard Providing Help in the Upcoming Election
    • Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor
    • Cybersecurity Role in Helping Retail Post Covid-19
    • Most Cybersecurity Companies Have Leaked Private Data
    • Data center giant Equinix discloses ransomware incident
    • Cyber Security Issues in Video games
    • Army robo-teammate can detect, share 3-D changes in real-time
    • Components Putting Operational Hardware and Software Technologies at Risk
    • Cybersecurity for US Space Systems
    • Why you shouldn’t throw away your broken IP camera
    • Tiktok national security Threat
    • Visa Warns of Payment Card Theft by Baka Card Skimmer
    • 16 Year Old Launches Cyber Attack Against School.
    • A data fail left banks and councils exposed by a quick Google search
    • How SMBs are overcoming key challenges in cybersecurity
    • Hackers Target Twitter Employees
    • "Most cyber-security reports only focus on the cool threats"
    • China Launches Initiative for Global Data Security Issues
    • City of Hartford postpones first day of school after ransomware attack
    • Why Academic Openness and A Rise in Online Classes Should Invoke a …
    • Federal Agencies Ordered to Make it Easier for Hackers to File Bug Reports
    • Another University become a victim of cyber attack
    • Apple approves malware disguised as Adobe Flash
    • Slack users unwittingly phished with malicious payloads
    • 86% of businesses say they're not ready for the next stage of the Data Age
    • Hackers Might Be Chasing Trump's Campaign And Business Websites
    • Trump Administration Focuses on Cybersecurity in Space
    • Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware
    • US Cybersecurity Agency Requires Disclosure
    • NSA Surveillance Program Illegal
    • Unsecured RDP Endpoints Attract Ransomware Gangs
    • 5 Cybersecurity Threats to Be Aware of in 2020
    • Python PyVil RAT Spreads to Fintech Companies
    • Miami-Dade Schools Hit by CyberAttack interrupting virtual classroom learning.
    • Free program blocks 10 million malicious domains from state and local government
    • Cybersecurity in Governments
    • Third Party and Supply Chain Risk Management
    • Manufacturing Industry Cyber Security Landscape
    • Cybersecurity in the Banking industry
    • Top Management Sponsorship
    • Bailey & Galyen Attorneys at Law was hacked by Ragnarlocker.
    • Video About The Cyber Crime Awareness
    • Need advice
    • What is PCI PIN?
    • How Do You Protect Your Master Passwords ?!
    • Where to find motherboards verified no hardware or UEFI security issues
    • [Security Rating] Discussion for supplier with IP in bad reputation
    • A few questions from an infosec student
    • How does php code gets executed in LFI
    • Self Assessment
    • Machine Hardening
    • Application Layer DDoS attacks
    • DoD Recommendation for Private Citizen Online Browsing
    • World Economic Forum's 5 principles for effective cybersecurity leadership
    • Cybersecurity Incident Response
    • New Technologies bring innovative challenge for Cybersecurity: Robots?
    • Data transfer between systems
    • Control frameworks in the field
    • Solution To Password Problems : GATE [ Graphic Access Tabular Entry ]
    • The Cloud for Financial Institutions
    • How GitHub untangled itself from the ‘Octopus’ malware that infected 26 software
    • Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking
    • Organizations Face Shortage of Cybersecurity Skills
    • Cyber Security firms raising millions as hacking numbers spike
    • IBM ups their layered cybersecurity strat to boost data resiliency and security
    • How to limit insider threats within an organization
    • Shoppers Using Malicious Browser Extensions
    • Global Cyber Security Market is forecasted to grow at a slower rate
    • 53% of People Admit They Reuse the Same Password for Multiple Accounts
    • Balancing Public Health And Data Privacy: Where Does COVID-19 Meet Cybersecurity
    • Cyber attacks worry hospitals
    • Remember to change your password
    • Coronavirus Cybercrime Increasing during Pandemic
    • DHS working to sucre mobile emails
    • Small Business Administration mistakenly leaks data
    • Covid-19 unites cyber security experts
    • Webkinz World Hacked
    • Small businesses using free or even no CyberSecurity Tools
    • Shoppers Using Malicious Browser Extensions
    • Is my company protected?
    • RMF Controls with CCI's Polices
    • RE: Sony Pictures Hack in 2014
    • Usability to increase security
    • SSH Credentials Targeted in Data Breach of Hosting Giant GoDaddy
    • Hacking of Giannis Antetokounmpo's accounts being investigated
    • Hackers Steal Data from Microsoft's Github
    • 46% of businesses report having a remote working security scare
    • China-based hacker group is hacking Asia-Pacific governments
    • 'Blacklist', 'whitelist' terms banned by UK cyber security agency due to racism
    • CS Digest Article Suggestion 3
    • North Korean Hackers Attack Apple Computers
    • Toll Group Suffers Ransomware Attack Again
    • Are you Ready for These 26 Different Types of DDoS Attacks?
    • 2FA app weaponized to infect Mac users with Dacls RAT
    • 2FA app weaponized to infect Mac users with Dacls RAT
    • Presidential Campaign Possibly Hacked
    • Covid 19 – First 100 Days in The Cyber World
    • Cyber-spies hunt Covid-19 research, US and UK warn
    • FGCU virtual graduation derailed by cyber attack
    • Late Notice: Tomorrow's Security Variety Show Reg Link
    • AI the new cybersecurity?
    • Apple Iphone at risk of being hacked through the email app
    • apple camera phones hacked
    • Game bans players who hacked to be better
    • The FBI is sending more public alerts then normal
    • Thief's threaten to leak data acquired in the Torrance, CA Ransomware attack
    • Foxit and Phantom PDF are prime targets for remote code execution
    • Ruby Developer Libraries infected with malware that targets Bitcoin Wallets
    • Content Delivery Networks and clouds join MANRS internet security effort
    • Cybersecurity for Remote Workers: Is Your Team Secure?
    • Battling Cybercrime by Adding Cloud Internet Security to SD-WAN
    • Cyber attacks increased during the pandemic
    • Clearview AI was cyber hacked
    • Cybersecurity Project
    • Zoom Now Implementing Call Routing
    • Vulnerability Scanning
    • OWASP Top 10 Vulnerabilities And Preventions 2020
    • New Way of Attacking the 2020 Campaign
    • A Good Time to Invest in Cyber Security
    • Large email extortion campaign underway
    • Solution To Password Problems : GATE [ Graphic Access Tabular Entry ]
    • Hackers have hit every country on Earth with coronavirus-themed cyberattacks
    • Facebook tried to buy NSO Group's Pegasus spyware to monitor iOS users
    • US to ban China Telecom
    • Sandboxie Windows sandbox is now open-source!
    • Only 25% of enterprises focus on cyber-attack prevention
    • 'Unkillable' Android malware gives hackers full remote access to your phone
    • Cyber security Breaches at Oakland and Berkeley
    • Cybercriminals Hide Malware Under SSL
    • “MakeFrame” Skimmer Targets E-commerce Businesses in New Campaign
    • Thousands of Android Apps Are Silently Accessing Your Data More than 4,000 Googl
    • 44M Digital Wallet Items Exposed in Key Ring Cloud Misconfig
    • Zoom has been hacked
    • Iranian hackers are exploited corona virus epidemic.
    • fake email from WHO
    • DODIG-2020-067: Followup Audit on Corrective Actions Taken by DoD Components …
    • Unwanted Guests In Zoom Conference Calls
    • The Coronavirus Cure Scams Continue
    • Cyber security Experts combat hospital ransomware
    • Malware Vollgar makes a come back attacking Microsoft SQL servers
    • Zoom Removes Data-Mining LinkedIn Feature
    • Beware! Hackers Deliver USB Devices Containing Malware Using Best Buy Gift Cards
    • Two 0-day flaws found in Zoom
    • Marriott Security Breach Impacts Over 5 Million Guests
    • Bitcoins Stolen From QR Code Generator
    • Patch Released for Linux Kernel Vulnerability Disclosed at Hacking Contest
    • Flaw in Rank Math WordPress Plugin Allows Hackers to Revoke Admin Privileges of
    • Cloudflare Launches a DNS-Based Parental Control Service
    • Hacking Attempts up by 37%
    • People are getting hacked just days after downloading the houseparty app.
    • FBI warns against zoom hackers.
    • GoDaddy Employee Victim of Phishing
    • cyber-criminals targeting zoom and google during these trying times
    • People are concerned about the increase in mass surveillance
    • Houseparty app offers people $1,000,000 for Information about Hacking
    • The WHO Hack Warns Of 'Massive' Remote Work Risk
    • Zeus Sphinx Banking Trojan Returns From the Dead in New COVID-19 Baiting Phishin
    • Zoom Scrutinized As Security Woes Mount
    • Nefilim Ransomware Threatens to Release Data
    • Zoom Removes Feature Sending Data to Facebook
    • Two New COVID-19 Related Phishing Scams
    • Marriott Data Breach
    • Zoom Hacked
    • Zoom Exploite
    • CS Digest Article Suggestion 10
    • CS Digest Article Suggestion 9
    • CS Digest Article Suggestion 8
    • CS Digest Article Suggestion 7
    • CS Digest Article Suggestion 6
    • CS Digest Article Suggestion 5
    • Hackers Pretending to be (WHO) As Coronavirus Spike & Attempt To Steal Passwords
    • Beware! Hackers Deliver USB Devices Containing Malware Using Best Buy Gift Cards
    • Computer scientists' tool fools hackers into sharing keys for better security
    • Coronavirus criminals: Authorities wage war against virus scammers, thieves, imp
    • Stolen Data on Sale
    • Analyzing the Behavior of Vidar Information-Stealing Malware
    • Analyzing the Behavior of Vidar Information-Stealing Malware Vidar is capable of
    • World Health Organization Targeted in Phishing Attack
    • Android Apps Spying on Your Software
    • Zero-day Remote Code Execution Vulnerability on Windows 7
    • Virgini Media Owes Up to £4.5bn Due To Breach
    • Malware Named "TwoSail Junk" Targets iOS Users
    • Maze ransomware group claims Chubb as victim
    • hackers use fake corona antivirus to get malware on people computers
    • Hackers are hijacking routers to push malware-laden Covid-19 apps
    • Zoom Meetings Targeted
    • U.S health agency attacked
    • Mobile Ad Fraud Used To Make Money
    • 400 Experts Are Fighting COVID-19 Scams
    • US Cyber Experts See Spike In Chinese Espionage
    • Virtual "Cyber School" set to launch amid school closures
    • Hackers Learning To Bypass 2FA
    • Hackers Use Fake “Corona Antivirus” Software to Distribute Malware Backdoor
    • New “WildPressure” APT Group Targets Industries in the Middle East
    • Hackers Use Fake “Corona Antivirus” Software to Distribute Malware Backdoor
    • Corona Virus used as cover
    • AMD'S New GPU's have been stolen
    • LabCorp Data Breach
    • Zyxel NAS devises targeted by Mirai variant
    • New IOS surveillance campaign underway
    • Skimmers code found on Tupperware's website
    • 5G inherits Diameter Signaling Protocol Vulnerabilities from 4G
    • Coronavirus Cyber Attacks
    • Phishing attacks more common than ever
    • iOS Bug Prevents VPNs From Encrypting All Traffic
    • Vulnerability In Windows 10
    • McAfee wins its seventh industry award
    • Attack on Home Routers send users to Spoof Sites
    • Hackers Pretending to be World Health Organization (WHO) As Coronavirus Spike
    • FormBook Malware Campaigns Attacking Aerospace and Manufacturing sectors
    • New AI-Driven Security Software for Wi-Fi Launched
    • Coronavirus Effects on Cyber May Not Be Felt for Weeks
    • Service Provider for GE Faces Data Breach
    • Covid19: Attacks on Heathcare systems
    • Which type of assets is more important in terms of cybersecurity?
    • Why cybersecurity matters more than ever during the coronavirus pandemic
    • T-Mobile: third party email attack
    • What companies should do to inform their employees about cyber risks
    • What are key considerations while integrating wearables with HealthCare App
    • Cybersecurity at home
    • Cybersecurity Money to Combat Exploited Pandemic
    • Twitter changing safety guidelines regarding COVID-19 posts
    • Windows Defender Skipping Items During Scan
    • Cybersecurity talent pool
    • Extortion Emails Threaten to Infect Your Family With Coronavirus
    • German army’s sensitive data found on laptop bought from eBay
    • UK Fintech Firm Finastra Hit By Ransomware, Shuts Down Servers
    • Account takeover and data scraping attacks on e-retailers up as COVID-19 surges
    • loT To Expand Service Portfolios
    • PC Matic Offers Free Cybersecurity Protection
    • Hackers Promise 'No More Healthcare Cyber Attacks' During COVID-19 Crisis
    • Microsoft Explains How It's Fighting Coronavirus-Related Cyber Attacks
    • COVID-19 & Infrastructures Resilience
    • The Most Threatened Sectors
    • Phishing an attack method that has maintained longevity
    • UK cyber security lacking
    • Data Breach at a British Printing Press
    • Critical RCE Bug in Windows 7 and Server 2008 Gets Micropatch
    • Newly Found Nefilim Ransomware Borrows Code From Nemty 2.5 Ransomware
    • Corona Virus Pandemic offers opportunity for Threat Actors to Steal Info
    • Schools are teaching more in cyber-security
    • Small Businesses are at risk to hackers
    • France warns of new ransomware gang targeting local governments
    • Adobe Releases Critical Patches for Acrobat Reader, Photoshop, Bridge, ColdFusio
    • Scams, Fraud and How Cybercriminals are Taking Advantage of Coronavirus
    • France Allowing Some Huawei Gear In Fifth Generation Network
    • Threat Data Vs. Threat Intelligence
    • There is a 2020 ethical hacking course bundle for only $60.
    • 67 percent high number of security breaches reported than five years back.
    • Whisper App Kept Users Profile Information Unsecured
    • Malware Delivery Through Fake Website Certificate Errors
    • Malicious domains are using presidential candidates’ names
    • New smartphone vulnerability found through Siri
    • Arkansas Children's Hospital Reboots System After Cyberattack
    • The CyberSecurity Industry is Consolidating
    • US Health and Human Services Department target of Cyber Attack
    • Us gov't unable to reach quickly enough to cyber threats
    • Canadian Government Breaches
    • Fifth Third Bank data breached
    • Microsoft 365 Working on APT Feature to Block Emails That Fail Authentication
    • Youtube phishing
    • Oklahoma accused of negligence in data breach
    • Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords
    • Hacker's benefit from Kobe Bryant
    • China increasing mass surveillance
    • Microsoft Issues March 2020 Updates to Patch 115 Security Flaws
    • Hackers are phising with Corona-Virus and HIV themed emails
    • Telecommuting Tools Made Free Amid Coronavirus Outbreak
    • Microsoft Warns Of 'Devastating' Cybersecurity Threat To Windows Users: Here's W
    • Forensic : extract files from MFT table Volatility [1]
    • Zero-day vulnerability in SaaS services exploited to launch IDN Homograph-like a
    • Chinese Espionage Allegations
    • Flaw in Intel Chipsets
    • J.Crew Data Leak
    • T-Moblie Data Breach
    • 900,000 customer's data breached from Virgin Media
    • Free WiFi Service Exposed User Details
    • Windows Explorer Used by Ransomware to Evade Detection
    • PwndLocker Ransomware Gets Pwned
    • T-Mobile Data Breach Exposes Customers Personal and Financial Data
    • White hat hackers find thousands of vulnerabilities
    • TQL hit with Cyber phishing attack
    • Can someone help me to answer this question, is very important, thank you
    • Ethical Hackers Find More Bugs Than Ever In Pentagon
    • Baby Monitors can be Hacked to Spy on You
    • US Grants $8 Million to Ukraine for Cybersecurity Assistance
    • 126 Million in Fines and Counting
    • Walgreens new app problems
    • Hackers attacking privileged accounts leaves businesses at risk
    • We need to start teaching young children about cybersecurity
    • 5G and IoT security
    • Russian Agents Reportedly Tapping on Undersea Internet cables that Take Entire
    • New Mexico Filed Lawsuit Against Google for Spying & Collecting Personal Data
    • Google issues Chrome update patching possible zero day
    • Better Mobile Security with a Mobile Threat Defense Plan
    • Cyber security experts: Hackers target children’s SS numbers
    • Documents were leaked for three major companies
    • Chrome 80 cripples cybercrime marketplace
    • Tesla's hacked by 2in black tape?
    • Facial Recognition Company Loses Entire Database to Hackers
    • Surfing Attacks' Could Let Hackers Read Your Texts
    • Ransomware victims thought their backups were safe. They were wrong
    • Modern malware is increasingly leveraging evasive behaviors
    • New Orleans Shuts down City Servers
    • Ransomware and Data Breaches triple in 2019
    • CISA Agenda For 2020
    • Jolly Cooperation Required
    • Israeli Marketing Firm Stored 49 Million Email Addresses in PlainText on Server
    • Hackers Attempt To Access Clean SS Numbers
    • Newly Discovered IMP4GT Attack Identified Targeting 4G Mobile Networks
    • Attacks targeting judges are on the rise.
    • Apple's iOS Pasteboard Data Leak
    • The iBaby monitors are now vulnerable to hackers.
    • Wifi vulnerability
    • Clearview AI breach
    • Defence Information Systems Agency (DISA)
    • Leader Of AtomWaffen Arrested For Hoax Calls
    • New Tools That Tricked Hackers
    • New cybersecurity allaince to tackle fragmentation
    • Multinational Attack Campaign By Iranian APT Group Targets Government Organizati
    • Silence Hacking Group Threatens Australian Banks of DoS Attacks if Ransom Not Pa
    • New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices
    • Clearview AI Client List Stolen.
    • DISA breach likely exposed personal data on at least 200K
    • Ransomware Becoming Bigger Problem Than Ever Before
    • State Department Officials Blame Russia for Cyber-attacks
    • Challenges that cause CISOs to fail
    • Hacking is the New Cold War
    • Lucy Security Receives Three Gold 2020 Cybersecurity Excellence Awards
    • Tesla Pays German Bug Hunter $10k Bounty!
    • Top 10 Android Pentesting tools
    • Phishing Attack on Advocate Aurora Health
    • Phishing attack catches Human Resource Department – Exposes Employees
    • What is unified security management (USM)
    • Making Use of Cyber Threat Intelligence
    • New Jersey Hospital Faces Lawsuit Over Ransomware Attack
    • Over 8.4 Million DDoS Attacks Reaching Up to 622 Gbps Detected in 2019
    • Cyber Hackers target and demand money
    • Microsoft Makes Antivirus for Linux
    • US Sponsors Pull Out of Cybersecurity Event
    • EU's Cybersecurity Legislation
    • Secure Information of the White House has been Breached.
    • Hackers us Coronavirus outbreak scare to spread malware
    • Google sued by NM Attourney for collecting student data
    • New GDPR legislation speeds up detection of cyber attacks.
    • Ransomware attacking Croatia petrol station chain
    • Cybercrooks Laid Bare 10.6 Million Hotel Guests' Data On Hacker Forum
    • Over 8.4 Million DDoS Attacks in Total and 16 Attacks Detected Every Minute in 2
    • New Emotet Smishing Campaign
    • Email extortion scam targeting websites that use Google's AdSense
    • Social Media Company Will Pay For Your Recordings
    • Over 1.2 Million Passengers Details Exposed in the SpiceJet Data Breach
    • Cybercrooks Laid Bare 10.6 Million Hotel Guests' Data On Hacker Forum
    • Microsoft is bringing its antivirus software to iOS and Android
    • New Cybersecurity Standards Pose Challenges for Industry
    • How to set up a secure digital forensics lab
    • Incident Management Process and Policy Importance – Free Template
    • Web Security from bodHOST continues with VTMScan
    • NYC Mayor accidentally tweets virus link
    • Ukrainian malware spreading through darkweb
    • Justice Department charges 4 members of Chinese military for massive Equifax hac
    • Data Breaches are a major concern
    • New Way to Use Stolen Credit Cards
    • Dell sells its RSA cybersecurity unit for $2.075 billion
    • AZORult Malware Infects Victims via Fake ProtonVPN Installer
    • MIT researchers identify security vulnerabilities in voting app
    • Senator Calls For Dedicated US Data Protection Agency
    • IRS Urges Tax Prep Pros & Individuals To Enable MFA in Tax Prep Software
    • Huawei stealing US corporate secrets.
    • Projected Cybersecurity Trends for 2020
    • 97 out of the top 100 airports fail cyber-security testing
    • Iranian hackers planting backdoors in companies by hacking VPN servers
    • BEC Scammers Siphoned Off $2.6 Million From Puerto Rico Government
    • Altice USA Hit By Email Scam Leaking Thousands of Employees' and Customers' Data
    • FBI warns over fresh malware from North Korea
    • Coronavirus malware scams return with a venegeance
    • U.S. Government Confirms ‘Malicious’ New Malware Threat: Beware—This Is The Wann
    • Scammers Steal $2.6 Million From Puerto Rico Government
    • Keyless Entry
    • Cisco Prepares Acquisition Bid For Cybersecurity Firm FireEye: Report
    • CS Digest Article Suggestion 4
    • Cybersecurity Jobs Going Begging As College Computer Science Grads Lack Skills
    • Mapping the Known Unknowns of Cybersecurity Education
    • PayPal Phishing Scam
    • Toll Group Shuts Down Systems
    • Chinese military charged with Equifax Hacking
    • $43M cyber security to spot attacks beforehand
    • Cybersecurity Is A Government Game
    • Altice USA Hit By Email Scam Leaking Thousands of Employees' and Customers' Data
    • BEC Scams Accounted For $1.7 Billion, Half Of Total Cybercrime Losses In 2019
    • FBI: Cybercrime tore a $3.5b hole in victims pockets last year
    • Microsoft Breach
    • Executive Given New Charges From US
    • Operational Technology Attacks Increased By Over 2000% In 2019
    • Cyber Attack Takes Down 25% Of Iranian Internet
    • New legislation to create a Data Protection Agency
    • Mozilla Firefox 73 Browser Update Fixes High-Severity RCE Bugs
    • Google: Efforts Against Bad Android Apps on Play Store Are Working
    • Russian Hackers linked to Racine, Oshkosh ransomware attacks
    • Cyberattack downs Pensacola computers hours after Navy base attack
    • Emotet Malware Infect New Victims through wi-fi connections
    • Ransomware Actors Targets Police Department in Miami, Demand Millions in Ransom
    • Altice USA Hit By Email Scam Leaking Thousands of Employees' and Customers' Data
    • New Topic
    • Leaked report describes Federal Parliament's cyber security as having 'low level
    • Build a SOC or Choose an MSSP?
    • Build a SOC or Choose an MSSP?
    • Hackers taking advantage of coronavirus scare to spread malware
    • Zero-day vulnerabilities
    • Personal information on 36,000 inmates was leaked
    • Chinese Military Hackers charged in Equifax breach
    • You might be able to get up to $100 from the settlement for Yahoo’s data breach!
    • Build a SOC or Choose an MSSP?
    • Metamorfo banking malware spreads around the world
    • Independent Airport Cybersecurity Test Reveals Concerning Results
    • From secure code to defense in depth
    • From secure code to defense in depth
    • Lock My PC Used By Tech Support Scammers, Free Recovery Available
    • Facebook's Official Twitter and Instagram Accounts Hacked
    • Websites to be blocked at a workplace to prevent any malicious activity
    • India's Data Protection Bill Threatens Global Cybersecurity
    • The Vulnerable Voting App
    • united nations got hacked
    • Awareness Myth Busting
    • US Interior Defense grounds Mavic drones at risk of cyber security attacks
    • IT Practices in the Iowa Election
    • County's Servers and Computer Systems Face Cyber Attack
    • Charming Kitten Uses Fake Interview Requests to Target Public Figures
    • Emotet trojan
    • NSA exposed bug in Microsoft software
    • Iowa caucus debacle is one of the most stunning tech failures ever
    • Cybersecurity Firm Named ForeScout Sold For $1.9 Billion
    • Financial sector attacked by backdoor called Minebridge.
    • How to not get hacked: Jeff Bezos
    • FBI ‘Drive-By’ Hacking Warning Just Got Real: Here’s How This Malicious New Thre
    • WhatsApp Vulnerability CVE-2019-18426
    • Smart Light Bulbs Can Still Be Hacked
    • NIST tests methods of recovering data from smashed smartphones
    • Chrome 80 Released With 56 Security Fixes
    • IRS Releases “Identity Theft Central” to Help Educate and Protect Taxpayers
    • Wisconsin city Ransomware
    • Quantum Boost Boss Busted by Dominos Pizza
    • Researcher Discloses Critical Flaws Affecting Millions of HiSilicon Chips
    • Anubis Phishing Trojan Targets Banking on Android Phones
    • Phishing Attack Exposes Personal Information of 5,000 at Community College
    • IT to Red Team: How to Make the Jump
    • FBI warns of possible DDos attack on vote registration websites
    • BlackBerry converts to software cyber security leader
    • UK police warn about hackers becoming cleaners to get inside of companies.
    • 97% of airports today do not pass cyber-security regulations
    • Hackers stole over a million dollars from charity
    • Automox raises $30 million to protect enterprise endpoints from compromise
    • Twitter Fixed Issue That Allowed Matching Phone Numbers to Accounts
    • A case for using Blockchains in Cyber Threat Intelligence
    • Google Accidentally Shared Private Videos of Some Users With Others
    • Iowa caucus debacle shakes public confidence 2020 security
    • Maze ransomware publicly shaming victims into paying
    • TA505 Phishing Campaign Sending Malware in Excel Files
    • Emotet Gang Attempts to Infect Japanese Targets with the Scare of Coronavirus
    • CEOs are deleting their social media accounts to protect against hackers
    • Google now treats iPhones as physical security keys
    • "Soon, mandatory cyber security course for all JNTU students"
    • Space executive says the industry needs help to understand cyber threats
    • Microsoft offers bounty up to $20,000 for XBOX security flaws
    • Microsoft Detects New Evil Corp Malware Attacks After Short Break
    • Cyber forensics and incident response study plan
    • Cyber experts discuss national security
    • UN Offices in Geneva and Vienna Suffered Major Hacking Attack Last Year
    • DOD cyber standards for contractors coming this week
    • Uk's cyber security sector worth £8.3 million
    • NFL, UFC, and ESPN accounts were hacked.
    • New topic
    • Cool New topic
    • CS Digest Article Suggestion 2
    • CS Digest Article Suggestion 1
    • Researchers report cyber risk associated with micromobiles
    • Attack on water company causes loss in money and network outage
    • UK Enacts Stricter IoT Safety Laws
    • Huawei set to be allowed limited role in UK 5G network.
    • Anti-Virus Subsidiary Collected Data From Millions
    • WAWA Breach
    • Government Spyware Company Spied on Hundreds of Innocent People
    • Ninth Annual Cost of Cybercrime Study
    • U.N. Hack Stemmed From Microsoft SharePoint Flaw
    • Dept. of Interior grounds its drones amid cybersecurity concerns
    • Unprecedented cybersecurity measures being taken to safeguard Iowa caucus result
    • Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers
    • Space ISAC to Release Cybersecurity Portal
    • How Vulnerable is your car to cyberattacks?
    • Sprint Exposes "Social Care" Forum User Data
    • New Topic
    • New Research Exposes Cybersecurity Risks for E-Scooters and Riders
    • NFL Twitter Accounts Hacked
    • NSA Releases Guidelines to Improve Cloud Security
    • Is it bad for Mail User Agent IP addresses to be visible in email headers?
    • Hackers in Turkey
    • Exploring the Nature and Capabilities of Anubis Android Banking Trojan
    • Wawa Breached Credit Card Information Now Being Sold
    • Historian believes that brain hacking might be coming soon
    • Fake Amazon Representatives stealing money
    • The World Wants More Tech Regulation
    • Saudi Prince Who Was Mad at Jeff Bezos May Be Involved In 2018 Phone Hack
    • Ryuk Stealer malware updated to target military and government files
    • Inside the World’s Highest-Stakes Industrial Hacking Contest
    • Another Poor Cybersecurity Audit at State Department Draws Scrutiny
    • Another Poor Cybersecurity Audit at State Department Draws Scrutiny
    • A brief introduction to malware analysis
    • How to discover your network using Nmap
    • F5-GTM Global traffic Manager Course now at Udemy
    • Cyber Threat Intelligence (CTI)
    • Myth-Busting: Threat Intelligence
    • Resource: OSINT tools and how to use them
    • Hello
    • Password Breaches Becoming More Common in 2019
    • Data leakage during transfer is a noted flaw in the 5G standard
    • WireGuard vpn to be added into new Linux kernel
    • VPNs becoming more prominent, efficient and viable
    • Google records device locations
    • China is Going All in on Quantum Security
    • Health and IT being targeted
    • CS Digest Article Suggestion 10
    • CS Digest Article Suggestion 9
    • CS Digest Article Suggestion 8
    • CS Digest Article Suggestion 7
    • CS Digest Article Suggestion 6
    • CS Digest Article Suggestion 5
    • CS Digest Article Suggestion 4
    • What is the best way to do assess Third party supplier ?
    • Password stealing Campaign
    • Airbus Launches Human-Centric Cybersecurity Accelerator
    • Google Trending Cybersecurity news headlines for this week
    • Bill to enhance regulators’ cybersecurity passes HFSC
    • Avast Target of Cyber-Security Attack
    • TrickBot gang now a malware supplier for North Korea
    • Vulnerabilities in Blink Home Cameras
    • iOS bug in air-drop allows lock outs
    • Intel CPU "digital vaults" not so secure
    • External Risk Assesment
    • New ransomware threat on Windows 10
    • How far should we drill down when Assessing Third party Suppliers ?
    • Cybersecurity predictions for 2020
    • Implementation of Employee Training Programs Should = Lower Insurance Premiums
    • U.S. Government alerts financial services of ongoing Dridex malware attacks
    • Rolling Code/Pins
    • CMMC Appraoch/Framework
    • Cybersecurity: Getting to the source
    • Security Risks
    • Network and data visibility
    • The FBI Warns that Smart TVs Could Be Spying On You
    • The Biggest Cyber Security Attacks of 2019 – UPdates
    • Dutch Politician Could Get Three Years in Prison for Hacking iCloud Accounts
    • IBM social engineer easily hacked two journalists’ information
    • You can do something about robocalls
    • Chinese Hackers Now Stealing Text Messages, Phone Records From Telecom Companies
    • Ransomware Attack Downs Hosting Service SmarterASP.NET
    • Two Security Researchers Earned $60,000 for Hacking an Amazon Echo
    • How to detect a phishing site?
    • Cybercriminals are doing big business in the gaming chat app Discord
    • Alleged mastermind behind $20m stolen-card site extradited to US
    • Monero website has been hacked, their wallet application found to have malware.
    • How the most damaging ransomware evades IT security
    • Potentially Unstoppable Ransomware Evasion Technique: “RIPlace
    • RDP Risks
    • Hacking Autonomous Vehicles
    • Steam Scam
    • Major Breaches
    • Hacking vulnerability
    • Microsoft fixes Authenitification
    • Attacks Over the holiday
    • New StrandHogg Vulnerabilty for Android Devices
    • US Gov't Changes Approach to Ethical Hackers
    • Ransomware hits French hospital: 6000 computers end up on lockdown
    • GitHub Security Lab to Find the Vulnerabilities with Open Source Applications
    • CyberCriminals Sold Tools in Dark Web to Hack Disney+ Accounts Before it Was Lau
    • Europol captures actors behind IM-RAT, cuts off malware operations
    • Target Sues Insurer Over Data Breach
    • Diverse Cyberattack Tactics Require Advanced Network Defenses
    • Unsecured Server Exposes 4 Billion Records
    • Scammers Steal Log-In Credentials Through Microsoft Excel Scam
    • Microsoft Windows Update Scam
    • Brand new Android smartphones shipped with 146 security flaws
    • Iranian Hackers Use Special Botnets
    • US Jails NeverQuest Malware Creator
    • Person steals cofidential hospital information
    • Man gets arested for 3 different cybercrimes
    • T mobile attacked again
    • Waterloo Brewing loses 2.1 million
    • How does dns cache poisoning really work?
    • Cybersecurity Experts Warn of Black Friday Email Scams
    • New Phoenix Keylogger
    • Mozilla Expands Bug Bounty Program
    • New NextCry ransomware goes undetected by antivirus engines to target Nextcloud
    • Why Has Multifactor Authentication Has Become a Target For Hackers?
    • Instagram stalker app Ghosty yanked from Play store
    • "Hundreds of Millions" of People Affected by Android Security Breach
    • North Carolina has a meeting to increase cyber security in the state
    • State of Louisiana responds to attack on state servers
    • Scammed in Nigeria
    • Fake "Windows Update" Installs Cyborg Ransomware
    • Cyber Criminals Have Registered Over 100,000 look-alike Domains
    • Are Bluetooth Devices Vulnerable to Hackers?
    • New Keylogger is on the loose.
    • New vulnerabilities found in android OS
    • App "Whatsapp" vulnerable to attackers.
    • New NextCry ransomware goes undetected by antivirus engines to target Nextcloud
    • Google Buys Fitbit For $2.1 Billion,because they don't have enough of your data
    • Google Is Collecting the Personal Health Data Of Millions of People
    • How long does it take a midsize company to onboard VMWare Airwatch/WorkspaceOne
    • Beware, online shoppers! Cybercriminals have registered over 100,000 look-alike
    • US, Montenegro plot cyber warfare ahead of 2020 election
    • Louisiana spurns attempted ransomware attack, governor says
    • It's Time For Everyone To Stop Using Passwords
    • Encryption: An Endangered Species
    • Are Your Encrypted Emails Really Encrypted?
    • East Texas School District Suffers Ransomware Attack
    • Cybersecurity is Heasing into a Recruitment Problem
    • Need Help For Unusual Case
    • Phishing Scam
    • scammers create over 100k fake domains to target retailers
    • women gets scammed out of 300k for simply wifi problems
    • Stealthy Malware Files Under AV Radar with Advanced Obfuscation
    • Penetration Testers In Iowa Arrested by Clueless Sheriff For Doing Their Job
    • CPU becomes vulnerable and risk of hacking
    • college had become a big target for hackers
    • Voice activated devices can be hacked by a laser
    • Stolen Credit Cards Validated Ahead of Black Friday
    • Hacking group in Iran built their own VPN network
    • Ransomware in Canada
    • Chip Flaw Let Hackers Steal Private Data Off Android Devices
    • Colleges are appealing targets for hackers
    • Javascript skimmer "Pipka" found to be targeting e-commerce websites
    • Many Public Cloud Infrastructures Suffer from Serious Security Loophole, Reseach
    • vpn set up to hack
    • Texan schools hit with ransomeware
    • ransomeware on oil company in Mexico
    • Threat Actor Impersonates USPS to Deliver Backdoor Malware
    • China having more cyber attacks than ever before
    • 7.9 Billion Records Exposed So FAR in 2019
    • General election 2019: Labour Party hit by second cyber-attack
    • Cybrary Lands $15 Million Series B Round to Train Cybersecurity Workforce
    • 5G Networks Still Vulnerable to Location Tracking, Downgrading Attacks
    • Exposed Wi-Fi Passwords To Hackers
    • Strange Ransomeware Only Targets Specfic Drives
    • Hashing
    • Facebook bug accesses iPhone’s camera while user scrolls through News Feed
    • Universities and Colleges Under Attack
    • Why Perpetrators of Phishing Attacks Love Social Engineering?
    • Google’s cybersecurity project ‘Chronicle’ is in trouble
    • Google’s cybersecurity project ‘Chronicle’ is in trouble
    • Exposed Wi-Fi Passwords To Hackers
    • $6.3 Million Grant Puts NAU At The Forefront Of Cyber Security
    • SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
    • Cybercrime Tool Prices Bump Up in Dark Web Markets
    • Cyber Crime On The Rise In Oregon
    • Antivirus hid more than 9,000 'cybercrime' reports from UK cops, says watchdog
    • YouTube Videos Pushing Bitcoin Tool Infects User With Trojan
    • Amazon’s Ring Video Doorbell Pro
    • Cyber security Project- Good Security Controls and Prices for Sheriff's Office
    • DoJ Says Ex-Twitter Employees Acted as Agents for Saudi Arabia, Violated Twitter
    • Hypothetical Global Banking Ransomware Attack – What Might Dooms Day Look Like?
    • Hackers Are Coming For Medical Devices
    • 5 Most common places your data is hacked in 2019
    • A former White House employee makes cyber security more accessible
    • Siri on MacOs reads encrypted emails in plain text with the Apple Mail app.
    • Lawsuit: Electronics giant Philips accuses Seattle-area company of hacking its m
    • Everis Hacked: Ransomware Sample Emerges, Company Silent on Attack
    • NordVPN Suffered a Security Breach, Denies Being Hacked
    • Facebook sues Israeli cybersecurity company NSO and claims it helped hack WhatsA
    • Former Disney Employee Claims the Company Hacked into His Personal Computer
    • Surveillance cameras being used in Pittsburgh made by Chinese company banned by
    • Canada Hit with Ransomware
    • DDoS Brains that Authorities Put to Sleep in 2019
    • Email Scams from fake Cable Company in Canada
    • Amazon Echo Hacked In Hacking Contest
    • Newly discovered ‘Light Commands’ vulnerability can be used to hack Alexa and Si
    • Common Evasive Phishing tactics – Cybercriminals
    • The Declining Effect of Disclosures on Threat Groups
    • Newly discovered ‘Light Commands’ vulnerability can be used to hack Alexa and Si
    • VPN’s are being used a digital defense by FBI in oregon
    • Intel chipsets have more security vulnerabilities
    • Russia going offline to perform tests
    • The American Cancer Society website hacked?
    • FL City Loses over $500,000 due to Phishing Attack
    • Adobe Creative Cloud leaks info of 7.5 million users online
    • Crypto exchanges remain one of the most targeted platforms in 2019.
    • Hackers Are Coming For Medical Devices, How Can You Defend
    • Cyber-Crime: Law Enforcement Must Keep Pace With Tech-Savvy Criminals
    • Hospital loses patient records after ransomware attack
    • URMC to pay $3 million penalty
    • 4 Billion lost to crypto hackers
    • An Illinois Superhero
    • Video doorbell help attacker get the Wifi!
    • Cyber Attack in school district!
    • serius vulnerability found in smart doorbell
    • Fingerprint Scanners are not secure
    • QNAP Warns Users to Secure Devices Against QSnatch Malware
    • Specially Crafted ZIP Files Used to Bypass Secure Email Gateways
    • Amazon's Ring Video Doorbell Pro Vulnerability
    • Chronicling Facebook's security and privacy breaches in 2019
    • 7 unexpected Cyber threats
    • Most organizations plan to increase their cybersecurity budgets in 2020
    • Police interrogate Alexa for clues in fatal spear-stabbing
    • Microsoft announces Azure Quantum, a cloud quantum computing service
    • Scammers Exploiting Firefox Bug
    • Ransom Attacks In Spain
    • APT41 Group Monitor SMS
    • 700,000 Old Windows Computers Exploited
    • Government Officials Hacked Via WhatsApp
    • smart devices not too secure
    • Encrypted Phones Sold By Crime Lords
    • iPhone Update
    • Phishing Scam
    • United States and Taiwan run cyber war exercises
    • Homeland Security and Federal Government gaming to test hack possibility's
    • Esports tournaments at risk from cyber security threats
    • Breach affects thousands of Home Group customers
    • Watchdog Sues FBI Over Facial Recognition Secrecy
    • Two unpatched RCE flaws in rConfig software expose servers to hack
    • A private DNA ancetry could be at risk
    • Salary Increase Phishing Email Leads To Stolen Employee's Credentials
    • ?Scammers are targeting Cash App users with fake ‘free-money’ giveaway campaigns
    • Marriott associate's social security numbers exposed
    • Malware is targeting android smartphones
    • Gafgyt variant exploits 3 devices to target game servers with DDoS attacks
    • Trojan Brings a Scare with Halloween Emails
    • fraudulent scheme used to get money from people using cash app techniques
    • smart bulbs used in homes could now be use to hack your personal info
    • Financial firms have major Cyber RIsks
    • whats app gets hacked
    • A Public School in Las Cruces Ransomware Attack
    • UniCredit data breach impacts 3 million Italians
    • The Malware Targeting Indian Financial Institutions
    • Hackers Attack Nuclear Plant in India
    • SmartBulbs– Not so Smart.
    • TikTok says no, senators, we’re not under China’s thumb
    • City of Johannesburg Refuses to Pay Ransom to Hackers
    • Facebook Sues NSO CyberSecurity Company over a WhatsApp Hack
    • Malware Targeting Financial Institutions
    • Hackers using ads with fake giveaways
    • ?Apple removes malicious iOS apps infected with clicker trojan
    • xHelper Trojan Reinstalls Itself After Removal
    • DDOS Mitigation
    • China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecur
    • ?Scammers are focusing on Cash App clients with counterfeit 'free-cash'
    • Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attack
    • Magecart Gang Targets Skin Care Site Visitors For 5+ Months
    • Russian Hackers Are Still Targeting the Olympics
    • Hotel in japan apologizes for letting video cams getting hcaked
    • Closing the cybersecurity skills gap
    • Country Of Georgia Faces Massive Cyber-Attack on Websites
    • Microsoft launches ‘911’ on-demand service for emergency security threats
    • SOC vs. NOC – Outsourcing
    • "What is the dark web? How to access it and what you'll find"
    • "Why Cops Can Force You to Unlock Your Phone With Your Face"
    • Kalispell Regional Hospital affected by Phishing Scam
    • Smart Speakers Eavesdrop?
    • Experts Warn Not to Use Public Wifi In National Cyber Sec. Awareness Month
    • Skimming has now been us online
    • Hacker in N.J. Admits Breaking Into 2 Companies
    • NOLS Ransomware
    • An agency in Germany declares Firefox as the safest internet browser
    • Doug Jacobson on recruiting cybersecurity students
    • Swedish Police Cleared to deploy spyware against crime suspects
    • Jackson Health to pay massive fine
    • FBI issues warnings
    • Samsung releases fix for Galaxy S10 due to fingerprint glitch
    • human error has been, and will continue to be the reason for security issues
    • Discord being turned into a backdoor for information stealing due to new malware
    • A new ransomware called "MedusaLocker" has been infecting victims worldwide
    • Who need strength when you have advances technology on your side?!
    • Hacker are trying to bring down ISP in South African
    • Iranian Hacking Group Targeted The American Satellite Technology Industry
    • Woman ordered to type in iPhone passcode so police can search device
    • Discord Turned Into an Info-Stealing Backdoor
    • Hackers tagert hotel guests through cams
    • "Ransomware Hits B2B Payments Firm Billtrust"
    • Icon-Hiding Android Adware Returns to the Market
    • United Kingdom Company Nominet launches new partner Velocity
    • A "Critical" Bug Found In Linux
    • Wifi Vulnerability found in Linux
    • U.K. Repelled 600 Cyber Attacks This Year
    • Montville man pleads guilty to hacking tech companies
    • Robots In Japanese Hotel Chain Found To Be Vulnerable To Hacking
    • Door Dash Hacked
    • Ransomware on the rise compared to previous years
    • Unauthorized access to computer
    • Hackers small companies as an easy target
    • Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested
    • Cyber Insurance Will Reshape Cyber security
    • Lack of cyber security talent is a national security threat
    • After ransomware attacks on cities, IBM offers free cyber security training
    • How a lack of cyber security made a Chicago broker loose 1.5 million
    • A Year in Cybersecurity
    • Autoclerk's hotel booking data breached.
    • Pentagon Thwarts 36 Million Malicious Emails Every Day, Navy Cyber Defense Opera
    • Major Chinese browser ‘Maxthon’ has a bug that allows anyone admin access
    • Gweillian Frank hit by 2m cyberattack
    • CyberAttack on Amazons website
    • States With the Best Online Privacy Laws
    • Russian hackers use Iranian hacking tools to launch attacks
    • Stolen credit card vendor "Briansclub" has been hacked
    • NordVPN was hacked
    • 36 Million Malicious Emails
    • Outdated OSs Still Present in Many Industrial Organizations
    • Cybercriminals Have Made A Lot Of Money Off Of Ransomware
    • Cybersecurity: Hostile nations responsible for attacks against UK organizations
    • Russian hackers cloak attacks using Iranian group
    • Avast Target of Cyber-Security Attack, Company and Czech Counterintelligence Say
    • High-profile Ransomware That Helped Attackers Make Massive Profits For Its Opera
    • Fake Plugins on WordPress Sites Allow Backdoor Access
    • House Committee meets to protect election for 2020
    • Avast cyber attack in the Czech Republic
    • Alexa and Google Home abused to eavesdrop and phish passwords
    • 5 cyber security threats you didn’t know you should be threatened by
    • "A Day in the Life of a Cyber Security Analyst"
    • "How Do Cybercriminals Get Caught?"
    • "9 cyberattacks that threatened officer safety and obstructed justice"
    • Texas University to be the first to offer cybersecurity degree for Healthcare
    • High School student hacked College Preparation Website
    • "NordVPN reveals server breach that could have let attacker monitor traffic"
    • SIM-Jacking
    • Torjanized Tor Browser
    • Malicious Photo app
    • CentruryLink customer records exposed
    • Face Unlock Bug found in the Google Pixel 4
    • Open database leaked 179GB in customer, US government, and military records
    • CBP mulls facial recognition tech for body cams
    • Tech Giant Releases a USB Type C Security Key
    • Cisco Aironet Wifi Access Points Remotely Vulnerable To Certain Security Flaws.
    • Malicious Bug was found on Mission Health website
    • Trump Campaign Website left open for attacks
    • Sextortion Email sent by Phorpiex Bots causes scammers to earn $20,000
    • Equifax used ‘admin’ as username and password for sensitive data
    • Largest U.S. Government Utility Company
    • Massachusette's bulking up on cyber security
    • Germany's cyber-security agency recommends Firefox as most secure browser
    • MSPs face increased risks and opportunities to rethink cybersecurity
    • Wichita Lawyer guilty in cyberattacks
    • Cozy Bear hackers have been caught perpetrating a years-long campaign
    • USB-C password security
    • people are creating fake presidential domains
    • Wichita Lawyer Pleads GuiltyTo Being Involved in Cyberattack
    • Windows® 7 is Becoming Even Riskier, Malware up by 71 Percent
    • faceBook is now paying users to report security flaws
    • Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products
    • Spies hacked Moroccan activists amid crackdown on protests: researchers
    • Scam That Compromises Servers And Links To Target LinkedIn Users
    • Stripe Users Targeted in Phishing Attack That Steals Banking Info
    • get back stolen data
    • Fake videos could influence the 2020 election
    • WAV audio files are now being used to hide malicious code
    • Cyber Attack on Iran Order by US
    • German test shows Firefox to be most secure broswer
    • Twitters Misuse of User Details
    • Thousands of Retailers Affected
    • 11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget
    • Australian CEOs are too overoptimistic for cybersecurity
    • Cryptojacking worm infects over 2000 systems using Docker to mine Monero
    • Mozilla Reduces Injection Attack Risk for Firefox Users
    • iPhone jailbreakers lured to click fraud site
    • A Deepfake Deep Dive into the Murky World of Digital Imitation
    • Scammers are finding new ways to scam people with the new IOS jailbreak.
    • The Need For A Breakthrough In Cybersecurity
    • 26 Million Stolen Credit Cards Rescued from Hack on "BriansClub"
    • "FBI says elderly and romance cyber scams on the rise"
    • Securing the digital Economy
    • Major SUDO Flaw
    • How Blockchain Will Solve Some of IoT's Biggest Security Problems
    • Almost All Systems Used in Aviation Are Vulnerable to Attack, Researchers Say
    • A fake crypto company push app that targets Mac users
    • NSA Opens Doors to Reporters to Explain It's New Cyber Directorate
    • Iranian Silent Librarian" Improving Tactics
    • Data on 92M Brazilians found for sale on underground forums
    • Planting Tiny Spy Chips in Hardware Can Cost as Little as $200
    • 250,000 User Data Is Stolen
    • Apple Shares Some Browsing History with Chinese Company
    • New Version Of California Consumer Privacy Act To Go Into Effect in January 2020
    • Mississippi Shows Flagrant Disregard for Cybersecurity
    • political camp. websites had a failing score mainly due to privacy and security
    • 3 Alabama Hospital's pay ransomeware
    • Hospital emails attacked in Gary, Indiana hacked and information stolen
    • MacOS Tarmac Malware Distributed To Users By Clicking Malicious Ads
    • Hackers Hide Behind Reliable Domains To Trick Victims
    • Flaw in Cyberoam firewalls exposed corporate networks to hackers
    • 140 local governments, police, and hospitals get attacked with ransomware
    • Itunes update has a zero day vulnerability
    • Blizzard accused of blocking users from deleting accounts amidst boycott.
    • Mississippi Audit finds "Disregard" for Cybersecurity Across State
    • capital one hacker accused of hacking 30 ore companies
    • Justdial app, accidentally cause hackers to log in to 156 million users account
    • manufacturing sector is getting attack non stop
    • Most Americans Fail Cybersecurity Quiz
    • 2 Charged in connection with Bell Canada Cyber Attack
    • Three Chain Restaurants EFT Machines Hacked.
    • Phishing incident exposes personal information of 60,000 patients
    • Malware Targets Chrome and Firefox To Sniff Encrypted Traffic
    • hack the army
    • Most Americans Fail Cybersecurity Quiz
    • Data on 92M Brazilians found for sale on underground forums
    • Drone Cyber Threats
    • Charming Kittens APT Group Targets Security Researchers From US and Middle East
    • families with people that were in the parkland attack are threatend by male
    • Google launches Password Checkup security tool
    • Ransomware attacks becoming increasingly targeted and costly
    • US University Offers First Ever Healthcare-Specific Cybersecurity Certification
    • Is Your Smart Home Cyber Safe?
    • One million people in New Zealand have there medical records exposed
    • Attackers Using Social Engineering to Bypass Multi-factor Authentication, the FB
    • The “Prying-Eye” Vulnerability
    • Nationwide facial recognition ID program underway in France
    • The Bureau Violated Privacy of American Citizens
    • MageCart Hits Volusion E-Commerce Sites
    • Cybersecurity Law In New York To Go Into Effect October 23, 2019
    • The lack of cybersecurity talent is ‘a national security threat,’
    • Cybersecurity awareness month
    • Arizona is emerging as a cybersecurity powerhouse
    • 7 Cybersecurity Threats That Can Sneak Up on You
    • TransUnion Info Exposed in Canada
    • Cybersecurity for Indonesia: What Needs to be Done
    • Words With Friends
    • DoorDash hack reveals data of nearly 5 million people
    • Google throws up red-flag over Zero-day bug
    • "Why Does the Law Enforcement Industry Need Security Awareness?"
    • Uzbekistan Nation-State Hackers Bad OPSEC
    • FBI Investigating 2018 Voting App Hack
    • What Happens When Cybercriminals Let Their Guard Down
    • Google brings Incognito mode to Maps
    • MIcrosoft states Iranians tried to hack U.S. presidential campaign
    • Business Email Compromise Scam
    • Companies Still Falling for Email Scams
    • AG Barr, Officials to Facebook: Don’t Encrypt Messaging
    • PayPal Scam That Has Been Stealing Details
    • How Incognito Google Maps Protects You—and How It Doesn't
    • EA Website loses data for 1,600 FIFA 20 pro gamers
    • Recent Ransomware attack has caused certain health systems to deny patients
    • Ransomware attacks increasingly targeted and more costly
    • The lack of cybersecurity talent is ‘a national security threat,’ says DHS offic
    • 802.11ax (Wi-Fi) on the rise
    • Stalkerware
    • New CPU Memory protects against attacks
    • US authorities seek access to Facebook encrypted messaging
    • whatsapp exploit allows hackers to gain unauthorized access to devices
    • apple cable can be used to hack a computer
    • Attacks on UK authorities
    • Egyptian Government Suspected of Cyberattack.
    • 218 million Words With Friends players lose data to hackers
    • Evil Lightning cable about to hit mass distribution
    • Uncovering the Rising Evil of Stalkerware
    • The NSA creates organization to protect the country's cyber world
    • FDA Releases Statement About Medical Technology Being Vulnerable to Hacking
    • Equifax, Words with Friends and beyond: Every major security breach and data hac
    • Uncovering the Rising of Evil Stalkerware
    • 10 hospitals attacked by randsomware
    • Devs of FarmVille had data stolen from their most popular mobile app
    • Outlining the threat landscape for encrypted connections
    • 6 Government initiatives in 2019 that boosted Cyber security
    • Medical Practice group closes after Ransomeware attack
    • Hackers Hold Computers of 23 Texas Towns For Ransom
    • Here's what went wrong in Baltimore ransomware attack that cost the city over $1
    • Internet Explorer
    • Browser bugs exploited to show a billion ads
    • Making old devices less sercure
    • 172 malicious apps found on google play
    • Cybersecurity giant Comodo can’t even keep its own website secure
    • "Cyber Crime & the FBI"
    • "Don’t Leave out Law Enforcement in Cybersecurity Planning"
    • Rogue fears rise inside corporations as hacks evolve into 'home invasions.'
    • UK man hacked women’s Facebook accounts to steal their intimate images
    • Delivery App DoorDash Becomes Latest Company To Suffer Data Breach
    • Former Yahoo engineer pleaded guilty to hacking thousands of accounts
    • Nearly 30 Iraqi Government Websites Hacked in Largest Operation Yet
    • Mass Production of O.MG Cable Can seemingly pass as Apple product
    • YouTube 'influencers' get 2FA tokens phished
    • Hackers are infecting WordPress sites via a defunct plug-in
    • Hackers Are Stealing Medical Records and Selling Them on the Dark Web
    • BlackBerry Launches New Cybersecurity Development Labs
    • Spain Security Firm Probed 'for Spying on Assange for CIA'
    • Wipers Disguised as Ransomware Have Become a New Weapon for Cybercriminals
    • eGobbler Infects Over 1 Billion Ads In Latest Malvertising Campaign
    • Illegal gambling apps snuck into Apple and Google stores
    • Fake Apps
    • Hacker Steals Over 218 Million Gamers Data
    • Hacker Steals Over 218 Million Zynga 'Words with Friends' Gamers Data
    • Researchers Discover New Downloader that Uses Microsoft SQL for Delivering Malwa
    • U.S. Steps Up Scrutiny of Airplane Cybersecurity
    • scammers spreading malware through Google Alert
    • Awesome tip on how to secure your smartphone from cyber threats
    • Is your sim card vulnerable to Sim Jackers?
    • Networks Speed
    • Mitch McConnell agreed to spend $250 million for election security
    • Dunkin’ failed to protect the security of its customers
    • 4G Router Vulnerabilities Let Attackers Take Full Control
    • Several cities have been paying a staggering amount of ransom in 2019
    • Illegal gambling apps snuck into Apple and Google stores
    • Hacker breaks into a smarthome virtually
    • Majority of All Cloud Misconfigurations Go Unnoticed
    • doordash experiences massive security breach
    • DoorDash breach affecting 4.9 million customers
    • Russian man pleads guilty to financial firm hacks
    • Voting Machines Still Have Vulnerabilities
    • The Nodersok Malware affects thousands of Windows personal computers.
    • Increase in data breaches in 2019 – could be the worst year yet
    • Malicious apps on Google Play receive 2+ million downloads before detection
    • do companies take cybersecurity seriously
    • 27 nations ink cybersecurity pledge
    • Hacker reveals soccer secrets
    • North Korean Malware
    • Attackers Abuse Narrator Utility to Access Windows Systems
    • Malware for Android
    • US Senators Approve DHS Cyber Hunt Act
    • Hacker Charged with 147 crimes after revealing soccer secrets
    • Hacker hacks Google home system
    • Microsoft Patched A Zero-Day Vulnerability
    • Hackers get chance to hack into satelite
    • Cisco Fixes Critical IOx Flaw Allowing Root Access to Guest OS
    • 'Keep I.T. Confidential' campaign raising awareness in NHS.
    • False hiring website targets veterans
    • 27 Countries pledge for the promotion of responsible behavior online
    • U.S. Department of Homeland Security’s (DHS)
    • Caution towards Snowden book offer, Instagram and Android dangerous scams
    • Windows Narrator Trojan
    • Magecard group targeting l7 routers in high traffic locations
    • Hacker Releases Exploit for vBulletin Zero-Day Vulnerability
    • Instagram Data Leak
    • Small Businesses Underestimate the Cost of Data Breaches- Report.
    • Issue that impacts third-party keyboard apps in iOS 13 and iPadOS
    • Only 31% of Employees Get Annual Training on Cyber Security
    • A Fake Employment Site Made to Take Control of Veterans Computers.
    • Scammers Impersonate Barclays Bank in a New Phishing Scam
    • 27 Countries Sign Cybersecurity Pledge with Digs at China and Russia
    • Instagram Phishing Scam Poses as a Copyright Warning
    • LastPass Fix Keeps Last Used Passwords Safe
    • 400 Million Medical Radiological Images Exposed on the Internet
    • Combining Human Expertise and Automation to Close the Cyber Skills Gap
    • Millions of YouTube Accounts Hijacked
    • Campbell County Health Ransomware Attack
    • 6 Best Practices for Performing Physical Penetration Tests
    • Medical images and data left unprotected
    • JP Morgan Hacker Pleads Guilty
    • Remote Access Trojan Spear-Phishing Targets US Utility Firms
    • Hackers might be able to hack into outdated machines making food.
    • 118 Million Dollar Growth in Cyber Security Field
    • The United States Air Force is welcoming authorized attacks on US satellite
    • Malicious Android Apps Evade Google Play Protect
    • DDoS attacks can wipe South African ISPs off the Internet
    • USAF announces new information warfare entity
    • USAF 10 year cyber warfare plan
    • Huge Growth in Cyber Security Field
    • Cybersecurity: Emerging challenge for law enforcement
    • Huawei suspended from global cyber-security forum.
    • WeWork unsecured WiFi exposes documents
    • Physical and Cybersecurity Convergence
    • Simjacker attack actively targeting various phones
    • Smishing attack targeting venmo users
    • Facebook Suspends Apps From 400 Developers Due To Malicious Apps.
    • 27 year old hacker ordered to pay back $1.1million worth of cryptocurrencies
    • “detect, respond, remediate, repeat,” is used to neutralized and disrupt (OCO)
    • Hackers literally sneaking in the backdoor
    • Cyber attack on Travis Central Appraisal District
    • WannaCry Ransomware Still Active After 2 years of being discovered.
    • New DDoS attack gets bang for a hackers buck
    • 125 new flaws found in popular router brands
    • City leaders must realize the value of Cybersecurity
    • chrome and add bockers
    • Cyber attack on Travis Central Appraisal District
    • Clever New DDoS Attack
    • Hackers are still breaching local government payroll portals
    • Up to 20 million people in Ecuador had their personal information breached.
    • google chrome vulnerabilities fixed after wednesday software update.
    • Bitcoin And Crypto Wallets Are Now Being Targeted By Malware
    • cookie stuffing on ad blocker in google chrome
    • "Ransomware: Cyber-insurance payouts are adding to the problem, experts warn"
    • Hackers target municipalities & poor Cyber Sec. can affect your credit score.
    • Over 1 million Google Chrome users affected by Cookie Stuffing From Ad Blockers
    • Zero Knowledge Proof
    • The Air Force will let the hackers hack a Satelite
    • Misconfigured Google Calendars leaking private information of thousands of users
    • Smart TV's subscription services leak information to partners.
    • Middle Eastern IT providers targeted by a group named Tortoiseshell
    • New hacking group called "Tortoiseshell"
    • Latest Windows updates patch over 80 OS vulnerabilities
    • Google Calendars possibly leaking private information online
    • Microsoft Phishing Page Sends Stolen Logins Using JavaScript
    • U.S. cities having higher priority on cyber security rather than personal safety
    • Huawei suspended from global cyber-security forum
    • Russia hacked FBI to Prevent Bureau from Tracking Russian Spies in US
    • Ecuador Investigates Data Breach of Up to 20 Million People
    • https://www.technewsworld.com/story/86198.html
    • Millions of medical records exposed online
    • Blue and White Party claims website hit by cyberattack
    • Security experts are saying cyber-insurance payouts are adding to the Ransomware
    • DHS holds all-star cyber summit this week
    • LastPass Loses Credibility As Credentials Are Leaked
    • CyberSecurity Attackers Pose As Executives to earn security certificates
    • U.S. Targets North Korean Hacking as Rising National-Security Threat
    • US Treasury targets North Korean hacking groups
    • Chicago Broker Fined $1.5m for Inadequate Cybersecurity
    • Facebook, YouTube used in Brazilian Phishing Scheme
    • 19 year old suspected of hacking award-winning recording artists
    • Entercom infected with ransomware and demanded ransom payment of $500,000
    • Attackers Infected a Radio Entercom with Ransomware and Demanded Ransom Payment
    • Wikipedia Gets $2.5m Donation to Boost Cybersecurity
    • North Korea Seen Using ELECTRICFISH, BADCALL Malware Variants
    • North Korean Spear-Phishing Attack Targets U.S. Firms
    • Google fined $170 million for violating kids privacy on YouTube.
    • Aomei Backupper security?
    • hackers can spy on mobile phone users using sim cards.
    • new type of malware is capable of data exfiltration and spying
    • Twitter Attack From Inside Of Your Phone
    • 80 Percent of Businesses Experienced a Cybersecurity Incident in the Past Year
    • Two Universities Targeted by Hackers
    • Vulnerabilities found in Bitcoin Lightning Network
    • Weekly Trends Report – 9/11/2019 Insights
    • The future of cyber security in 5G
    • An Unprecedented Cyberattack Hit US Power Utilities
    • mohawk valley community college hit by sophisticated cyber attack
    • North Korean Hackers Targeting US Entities
    • How Safari and iMessage Have Made iPhones Less Secure
    • Android users, has download a scam app that slow down their phone
    • SIM Card Hacking
    • Unprotected Elastic search database
    • Violations of Children’s Privacy Law
    • DNS-over-HTTPS Coming to Chrome 78
    • internet gas pump can be hacked
    • The Chinese face-swapping app that went viral but is dangerous
    • Radio giant Entercom hacked for $500,000 ransom
    • Uber fixes a vulnerability that could allow attackers to compromise users
    • New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS
    • College student tried to hack into Trump’s taxes by creating a fake FAFSA applic
    • Ransomware attack hit Souderton area school districts
    • RYUK related Ransomware targeting confidential information
    • Telnet Backdoor Opens More than 1M IoT radios to Hijack
    • Hackers Using "Sim Swapping" to infiltrate Twitter
    • Student info stolen as hacker hits Bethlehem schools
    • Huawei accuses US of cyber-attacks
    • Intel CPUs Vulnerable to Sensitive Data Leakage in NetCAT Attack
    • Metasploit Releases Public BlueKeep Exploit Module
    • Federal IT Contractor Hacked
    • LokiBot Info-Stealer Used in Spear Phishing Attack on US Company
    • Attackers Distribute Sodinokibi Ransomware Via Fake Forums on Compromised Sites
    • Third party (vendor) cyber assessments
    • Global Wikipedia & Blizzard Entertainment – DDOS Attacks
    • Weakness in Intel chips lets researchers steal encrypted SSH keystrokes
    • DarkWeb IoT Cyber Attacks Are Being Used To Target Gas Pumps.
    • McDonald's Annouces using a AI for taking orders
    • An Unprecedented Cyberattack Hit U.S. Power Utilities
    • Cyber-attack on U.S. grid, first of its kind.
    • Facial Recognition Technology
    • Cybersecurity: 99% of email attacks rely on victims clicking links
    • 80 Percent of Businesses Experienced a Cybersecurity Incident in the Past Year
    • BSA suffers data breach leading to PII of 12900 scouts leaked
    • Monster.com job applicants info exposed on unprotected server
    • Flagstaff school district grapples with cyber security attack
    • Exim MTA Root-granting TLS Vulnerability
    • High-severity zero-day vulnerability for Android OS disclosed
    • Joker malware commits ad fraud, data theft
    • Lubbock County IT repels malware attack on two terabytes of county documents.
    • YouTube fined $170 million over child privacy violations
    • New Australian Cyber Security Strategies
    • Financial losses of at least $45 billion in 2018
    • Cybersecurity and the Explosion of Augmented Reality
    • Hackers Have Begun To Target Colleges over Business
    • Why cybersecurity is a big problem for small businesses
    • Could we see an attack on the 2020 election?
    • MVCC cyber attack
    • The Future Of Cyber Security In Teens Hands
    • Why 5G requires new approaches to cybersecurity
    • Cyber threat that threaten the US Bioeconomy
    • Threat Intelligence Application
    • Passwordless World – Adoption Issues?
    • Cyberattacks on manufacturing company (Oil and Gas)
    • Active Directory Security
    • AI and ML used for social engineering
    • Cybersecurity in Real Estate
    • Most important system for broadcaster
    • Cybersecurity on retail
    • Gaining visibility into organizations information systems
    • Security Vulnerabilities in the Film/Movie Industry
    • cyberthreat against Power and utilities sector
    • Cyber Security for Cloud Data Storage
    • Segmenting Data on Mobile Devices?
    • Data Classifications in Insurance Sector
    • Insider threats
    • Phishing, is training the only solution?
    • Gmail / G-Suite spoof spam prevention
    • DOD Secure Access File Exchange achieves Initial Operating Capability
    • DOD Secure Access File Exchange achieves Initial Operating Capability
    • DOD Secure Access File Exchange achieves Initial Operating Capability
    • DOD Secure Access File Exchange achieves Initial Operating Capability
    • USB software encryption (istar.exe) malware?
    • Get Online Safety resources For Cybersecurity
    • What is KM? Knowledge Management Explained
    • US Census 2020 – Cyber Security and Maintaining Public Trust
    • Network Visibility Tool
    • Cyber Risks for ICT industry
    • Rise in data theft in Australia
    • Fighting Emotet
    • New York ruled fake likes and followers illegal
    • Flaw in macOS Mojave's privacy protection
    • Google's secret microphone
    • Facebook tricked kids into purchasing games without parent consent
    • iPhone Hacking Tool
    • Email list-cleaning site may hav leaked up to 2 billion records
    • Elsevier exposes users passwords and emails online
    • Government demands to know how the broadband companies follow privacy policy
    • 2 Million credit cards stolen and sold on Dark Web
    • Phishing Scam looks like it is coming from FBI
    • New Tech Support Scam
    • Unprotected database Microsoft cloud server
    • Large electric transformers are subject to cyber attacks which can cause outages
    • Vietnam 'on the edge' of becoming a mid-tier cybercrime hub
    • The key lessons of the Triton malware cyberattack you need to learn
    • Iran’s Wildest Hacker Crew Stole 13,000 Passwords From 98 Organizations
    • ElectrumDoSMiner botnet infects 152,000 computers to launch DDoS attacks
    • Unprotected database exposes personal details of over 80 million US families
    • Should cyber-security be more chameleon, less rhino?
    • Critical security bug in Qualcomm chipsets
    • Several video game companies found to be infected with malware used in ShadowHam
    • Amazon Flex drivers required to use biometrics for verification
    • Is micro-segementation the right solution for campus security?
    • Nest Cams Allowed Hackers Access
    • Sea Turtle DNS Hijacking
    • Scranos
    • TajMahal "Swiss Army Kit" is sophisticated, of unknown origin
    • What's the next multi-factor authentication for the DoD?
    • Mumbai cloud server honeypot hit by 700,000 attempted attacks within a month
    • Two New Jersey Secaucus High School students hacked the school’s WiFi to avoid exams
    • Planetary Ransomware Decryptor Gets Your Files Back For Free
    • Computer Virus adds fake tumors to scans
    • Defense Industry Companies Launch Supply Chain Cybersecurity Task Force
    • Researchers Show How Hackers Can Dupe Radiologists and A.I. Software
    • Xiaomi's pre-installed security app Guard Provider exposes users to MitM attacks
    • Office Depot scamming customers with fake computer diagnostics.
    • The market for network security had the highest growth since 2012.
    • Chinese woman carrying malware arrested at Trump's Mar-A-Lago Resort
    • Jeff Bezos Hacked by Saudis (SecurityWeek)
    • Trojan App
    • Georgia Tech Data Breach Exposes Info for 1.3 Million People
    • OceanLotus threat actor group leverages Steganography to deliver backdoors
    • When should a company consider putting on a full time cybersecurity person
    • Windows 7 support ends
    • Emplyment scams top the list of computer based scams at the present time
    • The Role of Machine Learning in Cybersecurity
    • Dealers targeted with cyber security plan
    • Hackers publish details on critical Magento flaw
    • 24 year old pleads guilty for hacking into Microsoft and Nintendo
    • United Kingdoms states that Huawei's cyber security practices are "a mess"
    • Phone malware targets financial infastructures
    • Article 13 passed by European Parliament
    • DoS flaw in AC drives allows hackers control
    • EU demands scrutiny of 5G risks but no bloc-wide Huawei ban
    • Hackers attacked one million-plus Asus users through malicious update
    • Chinese firm ordered to sell dating app to prevent blackmailing cleared persons
    • People Steal Thousands of Gallons of Gas
    • UK watchdog slams Huawei over ‘serious’ cybersecurity vulnerabilities
    • LockerGoga Ransomware
    • WInRar bug
    • The 7 Biggest Cybersecurity Threats In An IoT World
    • Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Comp
    • Tesla Model 3 Hacked on the Last Day of Pwn2Own
    • FEMA Improperly Shared Personal Information of Natural Disaster Victims
    • Retail Cyber Intelligence Summit Announces Call for Speakers
    • Password spraying attack on citrix
    • Mac-Focused Malvertising
    • Malware in Stenography
    • DRONESSS!
    • Fin7 is back with SQLRat Malware
    • Google, Facebook fraudster pleads guilty to stealing $123 million in BEC scams
    • Mueller's Report Released
    • Credit card stealing code diguising itself.
    • FEMA Exposes Survivors Personal Information
    • Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise
    • Renegade Android apps can siphon off your web logins, browser history
    • FDA says cybersecurity vulnerabilities found in some Medtronic devices
    • NSA’s Ghidra already found to be plagued by a security vulnerability
    • Multiple vulnerabilities found in Java Card
    • Zero-day in WordPress SMTP plugin
    • Key Cyber Security Considerations for 2019
    • Facebook says it left ‘hundreds of millions’ of users’ passwords stored in plain
    • vulnerability found in fujitsu wireless keyboard
    • Facebook improperly stores user passwords
    • Putin Passes Law Against Spreading ‘Fake News’ by Internet (Reuters)
    • VERT releases security patches for Microsoft
    • Microsoft: Iranian Hackers Caused Hundreds of Millions In Losses (SecurityWeek)
    • Cybersecurity firms using extreme tactics for marketing
    • Hackers encrypt files at a school through the use of Ransomware
    • Stolen email credentials being used to pry into cloud accounts
    • Report: Chinese e-retailer Gearbest leaves database exposed, endangering 1.5 mil
    • Two-thirds of all Android antivirus apps are frauds
    • Hamilton College faces Hack
    • Congress introduces bill for IoT cybersecurity standards
    • Andriod adware had nearly 150 million google play downloads before being pulled
    • Cryptocurrency OneCoin are Accused of Fraud Worth Billions of Dollars
    • Default account found in Cisco CSPC shows potential unauthorized access
    • End of the Line for Windows 7: Open road for hackers.
    • Googles New Marketing Push for Google Sign-In
    • Malware Spreads As a Worm, Uses Cryptojacking Module to Mine for Monero
    • Researchers find unsecured database with 763 million unique email addresses
    • Rampant sales of SSL/TLS certificates on dark web
    • Alphabet launcher first commercial cyber security product.
    • Chinese hackers target 27 universities for military secrets
    • Companies are flying blind on cybersecurity
    • IRS warns of new tax-related phishing scams
    • 8 Vulnerabilities Penetration Testers Recommend You Address in 2019
    • Protect you secure information from Hackers
    • Best to Worst
    • Lose Battles, But Win the War: Devising a Grand Strategy for Security
    • North Korean hackers target U.S. businesses
    • New Flaws Re-Enable DMA Attacks On Wide Range of Modern Computers
    • Cyber-thieves set sights on hijacking payment data
    • Ransomware attack on Israeli users fails miserably due to coding error
    • USB Killer Device
    • Network Reliant Internal Software Backup
    • ATM Hacking Has Gotten So Easy, The Malware's A Game
    • Hackers Can Slip Invisible Malware Into "Bare Metal" Cloud Computers
    • Compensating Controls for EOL Operating Systems
    • Increasing Network Visibility at commercial banks
    • Amazon Expanding to Seattle
    • Vulnerability allows Hackers to view Airline passenger data
    • A Shifty New Variant of The Qbot Banking Trojan Spreads
    • DNS hijacking to steal sensitive information on the rise worldwide
    • The ring doorbell could have been hacked to show fake images
    • In Delhi, nearly half a million of its Citizens Personal Data was Exposed
    • Team from Coast Union wins Mayors cyber cup
    • Contractors and freeelancers are the cause of most workplace security breeches
    • Securing the 5G future
    • Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR
    • IoT devices attacked faster than ever, DDoS attacks up dramatically: Netscout
    • Computers vulnerable to attack through USB ports
    • E-Ticketing Flaw Exposes Airline Passenger Data to hackers
    • Women in CyberSecurity (WiCyS) Announces Speaker Lineup for Sixth Annual Confere
    • Legislation Introduced in California to Strengthen Data Breach Notification Law
    • Global Security Alliance and MasterCard Create Small Business Cybersecurity Tool
    • BlackBerry completes billion-dollar security deal
    • DNS and Infrastructure Attacks (Security Week)
    • Fake Google reCAPTCHA image used to fool victims.
    • Hacking Virtual Reality
    • Cybersecurity is going to going to be an important topic for 2020 election
    • Ransomware encrypts Australian cardiac clinic’s patient files
    • Teenager finds vulnerability in MacOs gaining access to 2.2 billion passwords
    • Understanding the potential risks associated with hackers/crackers
    • WinRAR patches 19 year old security vulnerability
    • Strengthening Aviation Security
    • CryptoJacking becoming more popular
    • Google has created an encryption program for cheap android devices
    • Grid safety
    • Lockheed Martin, UCF Open $1.5 Million Cyber Lab in Orlando
    • Unplug Parts of the Electric Grid to Help Improve Cyber Security
    • New online scam putting shoppers at card risk
    • Cyber-Thieves on the rise
    • Loophole allows pirated apps to be downloaded on Iphones
    • Chrome will make it harder to block incognito browsing
    • Israel Launches Cybersecurity Hotline for Suspected Hacking
    • Accelerating America’s Leadership in Artificial Intelligence
    • Linux releases a new operating system designed to help cybersecurity workers
    • Australian Political Parties Targeted
    • canadian films being the target of cyber attacks
    • Creepy incidents with NEST cameras prompt password warning
    • 80 Percent of U.S. Businesses Expect a Critical Breach in 2019
    • Election Security Efforts
    • WordPress vulnerability via Cost Estimation plugin. (Security Week)
    • How big data & machine learning may help companies prevent cyber breaches
    • Coffee meets Bagel app data breach
    • A ex US Intelligence Agent charged with Spying and Helping Iranian Hackers
    • Urgent need for cyber security on the grid
    • VFEmail losses 17 Years worth of Emails due to cyber-attack
    • Xiaomi electric scooter can be hacked and taken control of
    • Turkish Police Arrest 24 Suspects Involved in Hacking Crypto Firm
    • Hackers exploit emotions on Valentine's Day
    • Not everything about cyber security is true
    • Linux Vulnerability
    • TrickBot variant steals credentials for remote computer access
    • Cyber attack on Malta bank tried to transfer cash abroad
    • Cyber Security Risk in Retail and How to Handle It
    • STOP ransomware on the rise
    • Windows Malware Runs on Macs, Bypasses Gatekeeper to Target Software Pirates
    • Windows Application running on MacOS, installs malware payload in process
    • Cyber Security In Retail
    • Cyberattacks on Cars Are Finally Getting More Attention
    • New Unpatched MacOS Flaw Lets Apps Spy On Your Safari Browsing History
    • Study on Electric Grid Resiliency Finds Urgent Need for Cybersecurity Investment
    • Zero-Day flaw in Adobe Reader DC
    • Three major websites are facing possible security breaches
    • Cybersecurity Loses Brand-Name Billing in House Intelligence Shuffle
    • Mortgage Financial Information Exposed
    • A New Cybersecurity Incident Strikes K-12 Schools Nearly Every Three Days
    • First hacker convicted sim swapping
    • Networked freezers at grocery stores are vulnerable to hacking
    • Apple Squashes FaceTime Eavesdropping Bug
    • 5 Cybersecurity threats Healthcare faces in 2019
    • Australian Signals Directorate locks down ACSC, Parliament computer systems.
    • a massive cyber security attack aka" wanna cry"
    • Australia’s security agencies are urgently investigating an attempt to hack the
    • Japanese government to hack citizens in the name of cyber security
    • With Cyberattacks On The Rise, Current Cybersecurity Workforce Can't Keep UpWith
    • Huawei 5G threatens US cybersecurity
    • Stolen UK identities getting sold?
    • Fortnite login flaw leaving millions exposed
    • Facetime eavesdropping bug
    • Which Countries Have the Worst and Best Cybersecurity?
    • China’s tech giant Huawei offers to build cybersecurity center in Poland
    • AS THE GOVERNMENT SHUTDOWN DRAGS ON, SECURITY RISKS INTENSIFY
    • Newcastle school targeted in fees phishing scam
    • RDP
    • Tesla's Model 2 will be prime target at upcoming hacker contest
    • Vulnerabilities Found In Smart Scale
    • Programmer find ATM loophole that let him withdraw $1 million in cash
    • A New Google Chrome Extension Will Detect Your Unsafe Passwords
    • Cyber Security could have an AI in charge
    • Recall on Child smart watch in UK
    • Android phones hackable by opening a PNG image file
    • Is your car hackable? USAToday
    • Hackers stole nearly half a billion personal records in 2018
    • NASA BATTLED CYBER SECURITY THREATS DURING GOVERNMENT SHUTDOWN
    • Company loses millions due to lost password
    • (ISC)² Partners with CyberUSA to Advance Cyber Education and Certification
    • Hacks on Microsoft
    • Google works on spotting dodgy ‘evil domains’
    • Duke Energy fined $10 million for cybersecurity failures on grid
    • 500 Million Personal Records were Stolen in 2018
    • The Cybersecurity 202: A bank wants to recover the $81 million North Korea
    • The Latest Threats to ATM Security
    • Why User Names and Passwords Are Not Enough
    • New backdoor discovered, targets Linux systems
    • The tech skills that will be in demand in 2019
    • DARPA explores new computer architectures to fix security between systems
    • Super Bowl LIII luring out hackers
    • Microsoft Issues Windows 10 Upgrade Warning
    • Mac and Chrome Info Stealers Are Cryptomining Malware Into The "Wild"
    • Digital Transformation Era is Putting Organizations’ Sensitive Data at Risk
    • The Next Generation of White Hat Hackers?
    • Info-Stealer FormBook continues activity using a new file hosting service
    • 14-year old found Apple’s FaceTime bug before it went viral
    • Consumers Abandoning brands after data breaches
    • Singaporean Health Ministry Recovering From two Data Breaches.
    • Japanese govt to hack citizens in the name of cyber security
    • CEO's are biggest risk for cyber attacks
    • Gps in smart toys poses potential threat to children
    • Law enforcement agencies in the US and Europe announced the seizure of xDedic
    • Why Facebook's Banned 'Research' App Was So Invasive
    • Airbus Suffers Data Breach, Some Employee's Data Exposed
    • Data Standards for the Air Force
    • YouTube impersonation scam has tricked 70,000 people, Study reveals.
    • Hacking spree reigns across Germany
    • The Cybersecurity 202
    • Virginia State Corporation Commission Cybersecurity Training Escape Room
    • Using AI's in the Cyber Security world
    • North Dakota Considers Major Cybersecurity Effort
    • Cybersecurity issues of American Weapons systems
    • Federal Agencies Audit their DNS security
    • Apple FaceTime bug allows instant audio, potential video access
    • Hackers broke into an SEC database and stole millions
    • Police Take Cyber Security for More Comprehension of Cyber Crime
    • Vulnerabilities in Cisco Routers
    • GandCrab ransomware and Ursnif virus spreading via MS Word macros
    • Global Talent Shortage is Top Emerging Risk Facing Organizations
    • Calling all UK SMEs! Invitation to Participate in a PhD research
    • New funding will help drive diversity in cyber security
    • Human errors are the #1 reason in why they are so many cyber breaches.
    • Consern with Two-Factor Authentication
    • Too few cybersecurity professionals is a gigantic problem for 2019
    • HPE Teaches Girl Scouts About Cybersecurity
    • Your information may have been leaked from these popular retailers
    • 2018 Set Record for Vulnerabilities
    • Internet experiment takes down Linux routers
    • DarkHydrus APT delivers RogueRobin Trojan via Google Drive
    • Phishing Campaign Delivers Nasty Ransomware, Credential-Theft Two-Punch
    • Government shutdown affecting Federal cyber security contractors
    • MS-ISAC CYBERSECURITY ADVISORY
    • Facebook’s privacy lapses may result in record fine from FTC
    • Good entry level jobs for those studying cyber security
    • Top USCYBERCOM Official Talks Threats to Satellites at CyberSat
    • Introducing a cyber security specialist into your business
    • Information System's Architecture and Cybersecurity
    • Shamoon Disk-Wiping Malware Re-emerges with Two New Variants
    • Marriot Hotel hacked, 500 million guests information stolen.
    • Facebook privacy concerns lead to $11.3M fine
    • Android Battery optimization app steals money from paypal
    • Iran Hackers target U.S Congress Officials
    • Apples App Store removes 3 fake health apps for security.
    • Misconfigured cloud server exposed f 120 million Brazilian taxpayers ID numbers
    • A New Google+ Blunder Exposed Data From 52.5 Million Users
    • Wiping phone, destroying evidence?
    • Trackers found in children's apps
    • Figuring out who self driving cars should hit
    • Phishing is still number one on attacking large companies
    • Robocallers
    • Misplaced USB with vital information followed by a large fine
    • Lock screen figured out on Apple iOS 12
    • Quora Gets Hacked
    • Federal Cybersecurity Reskilling Academy Announced
    • Moscow's New Cable Car System Infected with Ransomware the Day After it Opens
    • Children’s smartwatches once again found vulnerable
    • U.K., Dutch fine Uber $1.2 million over data breach violations
    • Block puzzles open the door to malware
    • Got a Sennheiser headset? You could be vulnerable.
    • Marriott Hack
    • marriott has a data breach
    • Marriott Hacking Exposes Data of Up to 500 Million Guests
    • Proofpoint customers – Advanced Geodo/Emotet Phishing Lures
    • US-CERT Alert (TA18-331A) 3ve – Major Online Ad Fraud Operation
    • Experts demonstrate how to exfiltrate data using smart bulbs
    • New Member. Looking for some advice.
    • Congress Wants To Have Federal Cyber Security Agency
    • NY Gun Owners new laws
    • CBC: Rogue tax workers snooping on Canadians in larger numbers
    • apple teaching youngsters how to code
    • android uses tricked into downloading malware from the google play store
    • Cybersecurity and Infrastructure Security Agency (CISA) Act of 2018
    • Tis the season! Here are some helpful articles on Holiday Cyber Safety
    • Half a million Android users tricked into downloading malware from Google Play
    • Data Leak at Instagram
    • New Botnet Data
    • Microsoft Live Session Hijacking
    • Instagram bug might have accidentally leaked passwords of some users
    • iPhone Hacked and Passwords Stolen in Six Minutes
    • Vision Direct breach exposes customers’ personal, financial data
    • russian hacker on the good side
    • nothing is really deleted from a phone
    • Ransomware Attack on Cloud Storage
    • Judge asks if Alexa is witness to a double murder
    • Vision Direct hacked!!
    • Windows exploits
    • new faceBOok vulnerability
    • Smart phone zero-days
    • iphone x can be hacked to pull recently deleted files
    • Week-long federal research exercise tests DARPA-developed grid recovery tool
    • Mozilla Creates Christmas List of Devices that are not Secure
    • Ways to get employees to buy-into security policies
    • JavaScript
    • Official Google Twitter account hacked in Bitcoin scam
    • japan
    • Prison time, hefty fines for data privacy violations: draft U.S. Senate bill
    • Cybersecurity News of the Week, October 28, 2018
    • Infowars Store Affected by Magecart Credit Card Stealing Hack
    • Botnet of over 100,000 growing Using 5 year old Bug
    • Japan’s Cabinet Minister Who’s In Charge Of Cyber Laws, Doesn’t Use Computer
    • 63 New Flaws (Including 0-Days) Windows Users Need to Patch Now
    • atms are easy to hack
    • THE US SITS OUT AN INTERNATIONAL CYBERSECURITY AGREEMENT
    • Microsoft Patch
    • Support wouldn’t change his password, so he mailed them a bomb
    • Microsoft Patches Zero-Day Bug in Win7, Server 2008 and 2008 R2
    • Google’s G Suite Twitter account is the latest to get hacked in bitcoin scam
    • iSH – An iOS Linux Shell for Your iPhone or iPad
    • Fileslocker Ransomeware
    • Cybersecurity Certification? Are CompTIA certs better than ISC2 ?
    • Hacking GTA = Jail Time/Hefty Fine?
    • CS Digest Assignment 10
    • 258,000 encrypted IronChat phone messages cracked by police
    • Apple appears to have blocked GrayKey iPhone hacking tool
    • Former High School Teacher Pleads Guilty to "Celebgate" Hacking
    • 258,000 encrypted IronChat phone messages cracked by police
    • Data Greater Demand for Cybersecurity Professionals by US Employers
    • U.S. Consumers’ Security Habits Make Them Vulnerable to Fraud
    • Top banks in cyber-attack ‘war game’
    • Tesco Bank fined £16.4m
    • Game server DDoS attacker pleads guilty
    • FileLocker – Ransomware for hire
    • HealthCare.gov breach exposed personal details of 75,000, including partial Soci
    • Security breach at Nordstrom exposed sensitive employee data
    • Virtual Machine vulnerability
    • public wifi article
    • National Security Agency Science of Security Initiative
    • Man sent to prison for DDoS attacks
    • Voting machine manuel tells officials to reuse weak passwords
    • Former cia programmer is charged for leaking classified information in prison
    • Isreal accused in cyber attacks on Iran
    • People Are The Biggest Security Risks
    • Don't Stop, keep improving
    • Virtual Box Zero-Day Vulnerability and How to protect yourself.
    • Statcounter analytics code hijacked
    • Issues in U-Boot Memory Handling
    • DJI bug lets personal information out to the public
    • Consumers making themselves more vulnerable
    • North Korea hackers steal money
    • Facebook Takes Down Fake Russian Accounts
    • FIFA Hacked Again?
    • HSBC data breach
    • New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data
    • Data Greater Demand for Cybersecurity Professionals by US Employers
    • Facebook users’ data, private messages found up for sale online
    • Children’s apps contain an average of 7 third-party trackers
    • Apples T2 Chip makes it more difficult to access mics
    • Security with Youth
    • New software helps to identify bots driving political propaganda
    • CS Digest Assignment 9
    • CS Digest Assignment 8
    • Russian Hackers Linked to Attempted Sabotage of Saudi Energy Plant
    • The Rise of Mobile Phishing Attacks
    • Agent Tesla Spyware Analysis
    • Intel announces Cascade Lake Xeons: 48 cores and 12-channel memory per socket
    • Hack Brief: Someone Posted Private Facebook Messages From 81,000 Accounts
    • Cyber Attack On New Jersey School
    • Intel CPU
    • Bluetooth Low Energy (BLE) chips
    • Intel CPU Flaw Exploits HyperThreading to Steal Encrypted Data
    • The Cybersecurity 202: Trump takes harder line on digital security…
    • New Ransomware
    • Apple Passcode Bypass
    • Top officals think data breaches are inevitable.
    • Self – driving cars
    • week 8
    • Bluetooth Chip Flaws
    • Apple claims T2 chip can stop hackers from listening in on macbooks
    • CommonRansom Ransomware Demands RDP Access to Decrypt Files
    • Vulnerability allows users to easily gain access to root privilege
    • new MacBooks provide an additional layer of security
    • USB-C UNPLUGGED NOT SAFE FROM HACKS!!!
    • Blockchain Protection
    • Chinese Intel Officers Accused of stealing Aerospace Secrets
    • Update Now! Apple releases security fixes for iOS, MacOS, others
    • Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer
    • Crypto exchange collapses, victims accuse it of exit scam
    • Feds charge Chinese intelligence officers with stealing U.S. plane technology
    • Are Data Breaches Inevitable?
    • Teen Computer Awareness
    • Mobile Phone Chargers On Attack
    • Block chains won’t fix internet voting. Here's why.
    • Details on TRITON Malware Attack
    • US Arm Targeted
    • Bushido-Powered DDoS Service Whipped Up from Leaked Code
    • Facebook used by another foreign government to divide USA citizens
    • US Citizens are Regularly Exposing Themselves to Cyber-Threats, Despite Concerns
    • Hackers selling research from universities on WhatsApp
    • Airbnb host using hidden camera
    • How serious is a breach in Air Canada App?
    • Agent Tesla – Malware for a fee
    • Cathay Pacific data breach
    • Linux Vulnerability
    • Phishing Attacks are Rising up More in Fall 2018
    • Philippines cyber beef up
    • Privilege Escalation Flaw in Linux
    • WordPress takes aim at ancient versions of its software
    • British Airways Customers Affected in Cyber Attack
    • Windows Zero-day
    • Deprecated PHP
    • New android malware
    • Poorly secured SSH servers targeted by Chalubo botnet
    • Russia behind attack on Saudi energy plant
    • Super Micro hardware infection
    • ai
    • Delta Airlines got hacked
    • Cathay Pacific data breach
    • FilesLocker Ransomware Offered as a Ransomware as a Service
    • Former high school teacher pleads guilty to hacking celebrities
    • Are your jilted apps stalking you
    • Google and Facebook accused of secretly tracking users’ locations
    • Phishing Attacks up by 297 percent Q3
    • Apple locks out graykey
    • Has windows really become more secure?
    • US Cyber Command Takes action on Russian Trolls
    • Two in five millennials use the same password for most of their online accounts
    • Cathay Pacific Suffers Data Breach Impacting 9.4 Million Passengers
    • Another Windows 0-day flaw has been published on Twitter
    • The Cybersecurity 202: McAfee's decision
    • Hacker Discloses New Windows Zero-Day Exploit on Twitter
    • 6 Growing Threats to Network Security
    • OT Network Risks
    • Windows Zero day
    • Phishing Report
    • Phishing Report Shows Microsoft, Paypal, & Netflix as Top Targets
    • Obamacare Sign-Up Channel Breach Affects 75K Consumers
    • Internet Hacking Is About to Get Much Worse
    • McAfee Tech Support Scam Harvesting Credit Card Information
    • Americans Not buying from Several Brands
    • Largest Cyber Attack on Iceland drivers
    • Beware Of People On The Inside
    • HealthCare.gov
    • Tumblr Patches A Flaw That Could Have Exposed Users’ Account Info
    • People giving up their information to companies
    • Streaming Library vulnerability
    • Bug Leaves Servers Vulnerable for 4 years
    • Building a Secure Home Network
    • Election Hacking
    • Twitter Releases Accounts tied to Russian Influence of American Campaigns
    • data science
    • 30,000 of the Pentagon's service members and employees were compromised
    • GandCrab Decryption Keys
    • Cyber vulnerabilities in US defense systems
    • New iPhone Bug Gives Anyone Access to your Private Photos
    • Return of old Chinese Malware
    • Federal officials say drones present an emergent cybersecurity risk
    • Hacker: I’m logged in. New LibSSH Vulnerability: OK! I believe you.
    • How Facebook Hackers Compromised 30 Million Accounts
    • Crypoto- mining malware attacks on iPhones on the rise
    • Is Google's Android app unbundling good for security
    • The Old Chinese Malware Returns
    • Nearly Half of Americans Willing to Give Brands a Pass for a Data Breach
    • Cyber Security Salaries Increase
    • Hacked vending machine
    • New York CISO: State committed to helping cyber security
    • Goodbye and RIP TLS 1.0, TLS 1.1
    • WhatsApp could hack your smartphone?
    • Earn Cybersecurity Certification
    • CA Law Change
    • Medical Device Security
    • Creepy Computer Future
    • Pentagon gets hacked???!!
    • New Technique Recycles Exploit Chain to Keep Antivirus Silent
    • Fake software update turns computers into cryptocurrency miners
    • Aircraft Analysis Tool Facing the Internet Exposes Airlines to Risks
    • WhatsApp vulnerability thru the video call function.
    • Pentagon cyber report card not good!
    • NHS
    • Weapon systems are an easy attack
    • US Weapons Systems Are Easy Cyberattack Targets, New Report Finds
    • Updating and fixing total 49 security vulnerabilities.
    • The malicious chips.
    • cyber problems
    • Millions at risk in Webcam Vulnerability
    • Adobe Fake Campaign
    • New Reports Show Increased CyberThreats, User Risks Remain High
    • Facebook Hack Creates Wide-Internet Failure
    • Wi-Fi Standard is getting a name change.
    • Hacking Forums Serve Different Purposes For Russian and Chinese Hackers
    • Millions at Risk from Default Webcam Passwords
    • New California for Passwords
    • Security concerns for midterm elections
    • Google+ hacked
    • China hid tiny surveillance chips inside servers being sent to the US
    • Report Finds Low Confidence in IoT Device Security by Consumers Living in Connec
    • Physical concerns with an IPS
    • Just Answering A Video Call Could Compromise Your WhatsApp Account
    • Where Did GOOGLE+ Go?
    • Pentagon aiming for the clouds Ploughs into the dirt
    • The Cybersecurity World Is Debating WTF Is Going on With Bloomberg’s …
    • Whatsapp
    • Just Answering A Video Call Could Compromise Your WhatsApp Account
    • US Advanced Weaponry Is Easy to Hack, Even by Low-Skilled Attackers
    • Cyber tormentor lands 17.5 years in jail.
    • GhostDNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
    • Website for researching and indexing DIACAP, RMF, CCI, STIGs and SCAPs
    • Attackers use voicemail hack to steal WhatsApp accounts
    • Naughty Hacker Steals $38k from SpankChain CryptoCurrency
    • Google plus is finally shutting down after serious vulnerability was found
    • really Panera got hacked???
    • MikroTik Winbox – much higher level of vulnerability
    • Microsoft Security Problem
    • Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
    • Variations in State Data Breach Disclosure Laws Complicate Compliance
    • This dark web market is dedicated to compromising your emails
    • Cyber Attack
    • Using Facebook To Log Into Other Accounts
    • UN Word Press Site Exposes Resumes
    • Port of Barcelona
    • Jaxx Wallet Users
    • Security breaches costing UK SMBs millions
    • Facebook Security company investigated
    • Cyber security tips after data breaches
    • How malware can find on Mac computers
    • Voting Day Fears
    • Dox on the Hill
    • Hacking accounts using voicemail.
    • Google Making new strides in response to malicious chrome extentions
    • Hackers using Instagram to sell accounts and botnets.
    • danish doesn't see benefits in hacking the russian hackers
    • Switching up Ransomware
    • a cyber ransomware attack
    • Attackers Wreaking Havoc on Farms.
    • ATM tricked from Hacked Bank Servers
    • 1 in 50 Emails Contain Malicious Content
    • How to Work with Hackers to Make Your Company More Secure
    • Chinese spies insert microchip into manufactured US servers
    • New App Gives Android phones an Important Upgrade
    • Apple and Amazon deny allegations by Bloomberg
    • Facebook hacked
    • October is National Cybersecurity Awareness Month, FBI To Offer Weekly Tips To..
    • Botnet
    • Facebook Breach
    • Russia's constant cyber attacks
    • Update now: Adobe fixes 85 serious flaws in Acrobat and Reader
    • Ghost DNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
    • Cyber crime is most serious threat to businesses
    • ALways try to make sure your home and/or business networks are secure.
    • ALways try to make sure your home and/or business networks are secure.
    • GOOGLE + Master Cards = No Offline Purchases?
    • Army Strong with Cyber Tactics
    • Apples lock screen being bypassed already
    • How to have that difficult “stay safe online” conversation with your kids
    • Danabot Banking Malware Now Targeting Banks in the U.S.
    • Tinder, and others struggle to determine how Facebook hack affects their users
    • San Diego
    • GhostDNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
    • The Facebook hack could be Europe’s first big online privacy battle
    • Election Systems & Software's M650 Has Been Vulnerable to Hacking for 11 Years
    • Web inventor Berners-Lee creates new privacy first way of dealing with Internet
    • Cyber Security Today: Sept. 28, 2018- Canadian Gov’t Data Breaches…
    • Popular taxi service, Uber has data breach.
    • The latest botnet Torii is smarter than me
    • Russian hackers exploit LoJack tracking to plant UEFI toolkit
    • Torii – not your usual Botnet
    • UEFI rootkit
    • 50 Million Facebook Accounts Hacked.
    • Is Payment Card Security Slipping?
    • voting machines can be hacked
    • Google partially reverts a controversial change
    • Facebook scolds police for using fake accounts to snoop on citizens
    • Russian VPNFilter is the Swiss Army Knife of Hacking
    • UBER's vulnerabilities exposed
    • 4GEE mini modems allows hacker to gain access to entire system
    • Modern Computer's at risk of data theft due to a new Cold Boot attack
    • Microsoft Adds New Tool to Azure DDoS Protection
    • Cyber security
    • Pangu Hackers have Jailbroken IOS 12 on Apple's New IPhone XS
    • 16 year old hacks Apple
    • Lojack hijack called Lojax
    • New YubiKey Will Help Stop Passwords!
    • Sound and Sound Device Hacking
    • Vulnerabilities within Cisco
    • The Cybersecurity 202
    • Uber pays hackers to keep quiet
    • Cyber-Securing Video Cameras
    • Knowledge Management Focus Areas?
    • DDoS Attack on German Energy Company RWE
    • Linux Kernal Bug .
    • Over 80 Cisco Products Affected by FragmentSmack DoS Bug
    • The Biggest Email Security Challenge Facing Organizations Today
    • Crypto Wallet Protection App Wants to Secure Your Wallets Against Malware
    • Public Wi-Fi Hotspots Are Bad
    • WPA2 is still the strongest wireless encryption protocol since 2006
    • Is WPA2 still strongest encryption option for wireless LAN?
    • Cyber Insurance
    • Bristol Airport Cyber Attack
    • Centralised Cyber Regulation
    • Attack sequence for Magecart / magentocore card skimming
    • Google says apps may scan Gmail accounts if they get user consent
    • Adguard changes passwords due to hack attempt
    • AdGuard adblocker resets passwords after credential-stuffing attack
    • Running a phishing campaign
    • New Adwind Campaign Targets Linux, Windows, and macOS
    • macOS Mojave Patches Vulnerabilities, But New Flaws Already Emerge
    • Pause on the Netflix & Chill
    • Facebook Fight Back on Election Meddling
    • Bankrupt NCIX customer data resold on Craigslist
    • Facebook's Warning
    • White house stepping up offense against hackers
    • It's Time to Get Real about Complex, Emerging Threats
    • Can a bank be 100% online without physical presence?
    • Credit Card Skimming
    • Credit Card Skimming
    • T-Mobile Data Breach
    • Firefox bug crashes your browser and sometimes your PC
    • Instagram Hack
    • Hackers steal $30 million in Cryptocurrency
    • Visibility networks
    • Government cyber security strategy
    • Threats are advancing just as fast as technology is.
    • Alert from FBI warns of phishing attacks against payroll accounts.
    • Hackers Steal Customers' Credit Cards From Newegg Electronics Retailer
    • Cyber security
    • US military given the power to hack back/defend forward
    • Becareful for website links on iOS New attack found
    • iOS Apps Discovered Sharing Location Data Questionably
    • Preventing the Other Kind of Hack Back
    • A Decade-Old Attack Can Break the Encryption of Most PCs
    • BotNet Creators Sentencing or Possible work for FBI
    • US to launch attacks against foreign opponents under new cyber strategy
    • Credit Card Information stolen from Neweggs payment page
    • Legislation Introduced to Solve Cyber Work Shortage
    • IoT threat: Malware targeting connected devices has tripled in a year
    • Hackers working wit the FBI.
    • Hackers selling info on whatsapp.
    • 2018 Worst Hacks So Far – Wired.com
    • The creators of the Mirai Botnet hope to work with the FBI
    • Credential Stuffing Attacks Generate Billions of Login Attempts
    • British Airways Hacked – 380,000 Payment Cards Compromised
    • Be Careful of Fake IRS Email’s This Time Of Year
    • Future Cybersecurity threats
    • Evil maid cold boot attack thougt to be solved is revived by researchers.
    • British Airways code
    • Sigma rules guide: threat hunting for ESM, ArcSight Command Center and Logger
    • Powerful Spyware Has Spread Far Beyond Initial Scope
    • Government Pay Service Compromised Due to Website Bug
    • No.1 Adware Removal Tool On Apple App Store Caught Spying On Mac Users
    • Threats against hospital cybersecurity & how to move forward if attacked
    • Database with 11 Million Email Records Exposed
    • Volkswagen, BMW and Daimler are facing an investigation into whether they held
    • Midland, Ontario Canada at the Wake of a Ransomware Attack
    • A browser con, an ad scam and lack of password control
    • Colorado printing company forced out of business due to attacks
    • New Brrr Dharma Ransomware Variant Released
    • Phishing Technique uses Old Tricks
    • Cyber Security Training
    • Credit Freezes Will Be Fee-Free
    • Half of Government, Military Passwords are Weak
    • British Airways
    • Google buys credit card records
    • VDI isn't as secure as we think
    • Dramatic Increase of DDoS Attack Sizes Attributed to IoT Devices
    • Files With 42 Million Emails and Passwords Found On Free Hosting Service
    • Peter Yuryevich Levashov pleads guilty
    • Half of Government, Military Passwords are Weak
    • MacOS warnings bypass discovered high sierra release
    • which countries host the most malicious domains?
    • Half of Government, Military Passwords are Weak
    • Browser security hole on Macs and iPhones
    • Google Secretly Tracks What You Buy Offline Using Mastercard Data
    • Google Secretly Tracks What You Buy Offline Using Mastercard Data
    • Microsoft released important security updates on 9/11/18
    • North Korean Lazarus Group Targeting MAC users
    • CS
    • Cold Boot Attack
    • Tesla's keyless car vulnerable to a spoofing attack
    • Microsoft purges 3,000 tech support scams hiding on TechNet
    • Online shopping could come at a cost
    • New Python Ransomware Poses as Locky
    • Google Making the Web more Secure
    • Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob
    • Runaway Technologies and Why They're Dangerous
    • Hackers slipped passed British airway defenses
    • More US households had an online security breach in 2017
    • Hijacked MEGA Chrome Extension
    • How to Protect Against Human Vulnerabilities in Your Security Program
    • CS
    • The Fast-Growing Job With A Huge Skills Gap: Cyber Security
    • Introduction
    • The Right Professional Profile for a "Security Awareness Officer"
    • Finance company
    • Can Blockchain stop SPAM?
    • The death of passwords
    • AI, IoT and Cybersecurity – What does the future holds for Users
    • Visibility of Security threats
    • Identity and Access Management
    • CyberSecurity for Small orgs
    • are companies investing in their cyber Security Management
    • digital engineering and model formalization
    • How to get into Future career path in Cybersecurity
    • Software Assurance for Offshore Development
    • NIST Releases Final Draft of Special Publication 800-171A for public comment
    • NIST Releases Second Errata Update for Special Publication 800-171 Revision 1
    • Signalling System 7 Vulnerabilities in Telecom
    • Future of Cyber Security
    • How will cyber criminals exploit the RCE vulnerability in EOS Blockchain using S
    • How Secure is AWS Authentication when using Google’s identity service for user i
    • EMV Cryptogram-enabled Chip Cards Lead to 76% Drop in Payment Fraud
    • Advice for career
    • VPNFilter Router Malware Attack – Is Russia Up to its Common Tactics?
    • How Serious is the ZipperDown iOS App Programming Vulnerability?
    • Impact of Software As A Service to Cyber Security
    • RSA Conference’s Cybersecurity Tech Accord – Substance or Delusion?
    • Cybersecurity Management
    • “Roaming Mantis” – Assessing the Impact of Android Malware on Users Worldwide
    • Can a Telco be hacked?
    • Syrian Electric Army (SEA) Delivers Cyber Attacks to Defend President Bashar al-
    • Cyberattack vs Cyberdefence
    • In the cyber-physical domain Cyber Security requires to consider both – OT and I
    • The Cyber Threat Within: US FBI Identifies “Vault 7” Attack Suspect at the CIA
    • Can We Expect Iran to Launch Cyber Attacks in Responsefor the US Revoking JCPOA?
    • Measuring the Vulnerability of the US Power Grid to Russian Cyber Attacks
    • AI Being Weaponized to Launch Next Gen Cyber Security Warfare
    • The Top Five Global Cyber Security Threats for 2018
    • Spartacus ransomware shows sparse features can still fight hard
    • Delaware data breach resource site goes live
    • NYU and NY Cyber Command team up to offer cheap cybersecurity education and trai
    • Trump administration looking to rescind cyberwarfare approval process
    • Drupal sites running cryptomining maleware
    • Hackers Hiding Maleware in LoJack devices
    • Kaspersky Labs outlines development of hacker group ZooPark
    • Knox Tennessee voting hit with DDoS attack
    • Andriod's new OS will prevent apps from accessing data
    • Suspect Traffic Seen.
    • Twitter urges users to change passwords after finding bug in password storage sy
    • Microsoft fixes critical RCE bug in hcsshim library
    • How Vulnerable are Cryptocurrency Wallets to DNS Attacks?
    • NATO Team Wins the CCDCOE 2018 Locked Shields Cyber Warfare Competition
    • CS digest Article
    • Microsoft has lunch a new Windows Defender Browser Protection extension to help
    • Finding & Activating Hidden Features in Windows 10 Using Mach2
    • Windows Insider RS5 Build 17650 Brings Firewall Rules for WSL
    • Big IoT Botnet Starts Large-Scale Exploitation of Drupalgeddon 2 Vulnerability
    • The Week in Ransomware
    • LinkedIn patches serious leak in its AutoFill plugin
    • No secure Internet??
    • CS Digest Article
    • CS Digest Article
    • Power Lines that has been created by Researchers capable of stealing Data
    • What Can Really Happen at a Cash Register
    • It is going pretty far
    • Cyber Security
    • Could Gamers Be The Answer?
    • Advice to delete any malicious, unknown, unnecessary apps your Android Phone
    • Seldom Progress Achieved on Voting Security
    • New Cryptomix Ransomware variant discovered
    • CS DIGEST ARTICLE
    • Digital signature giant DocuSign files for IPO after fifteen years
    • Boeing Malware intrusion
    • Money Got Good..
    • Microsoft Releases more Information about Gamarue Maleware
    • Fileless Malware
    • Data Breach
    • Cyren reports crypto-mining websites has jumped by 725%
    • ransomware
    • Banking trojan Gozi ISFB
    • vulnerability
    • FBI used Best Buy's Geek Squad as confidential informants
    • Half million email Systems needs patched
    • Preparing for near future Cyber War
    • Vulnerable servers exposed, causing some easy hacking that can go bad
    • Private Browsing
    • Vulnerability in State Voting Sytems allow for potential hacking
    • forged e-passport
    • Businesses are avoiding little things that can hurt them
    • Cyber Laws of War – Finally coming of age
    • Apple issues again
    • tips to avoid being used to mine for digital currency
    • Tax Identity Theft – Part 2 – Warning signs, If you're a victim, Minimizing Risk
    • A Pragmatic Approach to Fixing Cybersecurity: 5 Steps
    • Tax Identity Theft – Part 1 – The Basics
    • Chaos Engineering and M&S
    • Windows
    • Looking for Recommendations – Patch Management
    • Technical Writing class – questions – PLEASE HELP
    • Data Privacy – Personal Information: Risks and Mitigation
    • Data Privacy – What is the difference between privacy and security?
    • Data Privacy – What is it? Why Does it Matter? Why Should I Care?
    • Topic of Discussion..??
    • Vulnerability Management
    • Protecting systems, network and data
    • Cyber Attacks in Mass Manufacturing Companies.
    • Suggestions for Overview of U.S. Cybersecurity Regulatory & Compliance Landscape
    • Automate ICS and SCADA vulnerability evaluation
    • Automating Operational Technology (OT) vulnerability evaluation
    • Thoughts on updated NIST Cybersecurity Framework (draft version 1.1)
    • What are the 2018 top cybersecurity threats?
    • Attacks
    • Supply chain security
    • Risk Management in Cyber Security
    • Encryption Software
    • Adversary emulation
    • SEIM TM and VM
    • The Year in Cybersecurity
    • Suggestions for security tools
    • Automated Penetration and Breach testing
    • Security Monitoring in hybrid on-prem/cloud environment
    • Cuckoo sandbox
    • Threat Detection & Endpoint Protection
    • Endpoint protection
    • Thoughts on Behavioural Augmentation due to AR/VR Proliferation
    • Critical Data Backups vs Cyberattacks
    • Will GDPR of EU make company information more secure ?
    • Corporate Response to Attacks
    • Fortigate & PCI
    • Scientific and practical cyber security peer reviewed journal
    • DTIC Documents and Search
    • Views on M&S and Machine Learning
    • eSIM Cybersecurity Concerns?
    • Seeking participants for Ransomware Survey
    • Need Cybersecurity Expert
    • Ransomware Survey
    • Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure
    • Use of BioMetric Devices
    • Multifactor Authentication – Meeting IA-2 Controls
    • DoD Announces the Launch of “Code.mil,” an Experiment in Open Source
    • Potentially Massive HTTPS Leak
    • Revision of NIST SP 800-171 – Ask Your Questions Now
    • Looking for direction
    • Cybersecurity (CS) Digest Article Suggestions
    • Must an organization meet all CUI and related control enhancements in 800-171
    • Reality Instead Of Hype
    • Cybersecurity Incident Reporting for Government Contracts
    • New FAR rule: Basic Safeguarding of Contractor Information Systems
    • Artificial Coffee
    • Before Computers And After Computers
    • Why There Are Failures In Building Software Products
    • Time To Rethink Object Oriented Programs
    • Do not look for the silver bullet solution.
    • Thought For Software Developers
    • Out dated software technology by government
    • The Lessons Learned The DoD Forgot To Write
    • Better User's Interfaces
    • The Never Ending Computer Languages
    • CUI on Corporately Owned Networks
    • Welcome to the Software Intensive Systems Engineering forum!
    • Welcome to the Knowledge Management & Information Sharing forum!
    • Welcome to the Modeling & Simulation forum!
    • Welcome to the Cybersecurity Forum!

    KM Policy Charts

    • 2019-11-04

    KM Policies

    • U.S. OMB Memo – Anti-deficiency Act Implications and Certain Online Terms of Service Agreements
    • DoD Instruction 8170.01 Online Info Mgmt & Electronic Messaging
    • IRM 2300-11A Enterprise IT Service Management Knowledge Management Process Guide
    • MCTP 3-30B Information Management
    • AFSC 3D0X1 KM – Career Education and Training Plan
    • DON CIO Memorandum – Acceptable Use of DoN Information Technology
    • FM 6-01.1 Knowledge Management Operations
    • NIH Plain Language Online Training
    • OPM Plain Language Guide
    • GAO IT Management Best Practices
    • AFM 33-396 Knowledge Management
    • Department of Navy Knowledge Management Strategy
    • AR 25-1 Army Information Technology
    • CJCS Knowledge and Information Management
    • NATO Communication & Information Agency Knowledge Management Strategy
    • OPM Strategic Information Technology Plan
    • OPM Digital Government Strategy
    • MCRP 3-40.2B Internet Tactical Chat in Support of Operations
    • AFTTP 3-2.77
    • NTTP 6-02.8
    • ATP 6-02.73 (CAC Only)
    • Tactical Chat – Multi-Service TTPs for Tatical Chat – Jan 2014 (CAC Only)
    • AFPD 33-3 Information Management
    • HOI 33-4 HQ Air Force IM & Compliance
    • AETCI 33-303 Command Enterprise IM SharePoint
    • MCO 5220.13 Marine Corps Continuous Process Improvement
    • AFI 38-401 (AETC Supplement) Continuous Process Improvement
    • AFI 38-401 Continuous Process Improvement
    • DODDIR 5010.42 DoD-Wide CPI/Lean Six Sigma (LSS) Program
    • GAO Streamlining Government
    • MCBUL 5210 Policy for Email Usage, Email Accout Management & Records Management on the MCEN NIPRNET
    • Refer to DoN CIO Memorandum Acceptable Use of DoN Information Technology
    • AR 25-13 Army Telecommunications & Unified Capabilities
    • MCO 5231.3 Marine Corps Data Strategy
    • DoN strategy for Data and Analytics Optimization
    • Army Data Strategy
    • OPM Open Government Plan
    • MCO 5210.11F Marinie Corps Records Management Program
    • USAF Records Management Program
    • SECNAVINST 5210.8F DoN Records Management Program
    • SECNAV M-5210.1 Rev. 1 DoN Records Management Manual
    • AR 25-400-2 The Army Records Information Management System
    • AFI 33-332 Guidance Memo to Air Force Policy and Civil Liberty Program
    • SECNAVINST 5211.5F DoN Privacy Program
    • DoDR 5400.11-R DoD Privacy Program – Regulation
    • DoDD 5400.11 DoD Privacy Program
    • DoDI 5400.16 DoD Privacy Impact Assessment Guidance
    • DoDM 5240.01 Procedures of U.S. Intelligence Activities
    • Executive Order 12333 U.S. Intelligence Activities
    • Privacy Act of 1974 with Overview/2015 Edition
    • CMC White Letter 1-17 Recent Conduct on Social Media
    • MARADMIN365/10 Social Media Guidance
    • AFI 35-107 Public Web and Social Communication
    • SECNAVINST 5720.44C Public Affairs Policy & Regulations
    • U.S. OPM Social Media Policy
    • OPM Open Government Plan
    • Department of Justice E-Government Act of 2002
    • Title 40 U.S.C. 25 Information Technology Mgmt

    Certifications

    • U.S. Army Functional Area 57 (FA57)
    • Architecture Tradeoff Analysis Method Leader
    • CERT-Certified Computer Security Incident Handler
    • SEI-Certified PSP Developer
    • Certificate in Knowledge and Innovation Management (CKIM)
    • Certificate in Knowledge and Innovation Management (CKIM) – Distance Learning Program
    • Certificate in Knowledge and Innovation Management (CKIM) – In-House
    • Certified Chief Information Security Officer (C|CISO)
    • Certified in Risk and Information Systems Control (CRISC)
    • Certified Information Security Manager (CISM)
    • Certified Information Systems Auditor (CISA)
    • Certified Information Systems Security Professional (CISSP)
    • Certified ISO-27000 Specialist (G27000)
    • Certified Knowledge Management Professional (CKMP)
    • Certified Knowledge Manager (CKM)
    • Certified Knowledge Manager (CKM)
    • Certified Knowledge Manager (CKM)/Certified Knowledge Environment Engineer (CKEE)
    • Certified Knowledge Manager (CKM)/Knowledge Economics
    • Certified Knowledge Practitioner (CKP)
    • Certified Knowledge Specialist
    • Certified Modeling & Simulation Professional (CMSP)
    • Certified Software Development Associate (CSDA)
    • Certified Software Quality Engineer
    • Cisco Adaptive Security Appliance (ASA) Specialist
    • Cisco Certified Architect (CCAr)
    • Cisco Certified Design Associate (CCDA) Certification
    • Cisco Certified Design Expert (CCDE) Certification
    • Cisco Certified Design Professional (CCDP) Certification
    • Cisco Certified Entry Networking Technician (CCENT)
    • Cisco Certified Entry Networking Technician (CCENT) Certification
    • Cisco Certified Internetwork Expert (CCIE) Data Center
    • Cisco Certified Internetwork Expert (CCIE) in Routing and Switching
    • Cisco Certified Internetwork Expert (CCIE) Security
    • Cisco Certified Internetwork Expert (CCIE) Storage Networking
    • Cisco Certified Network Associate (CCNA) Certification
    • Cisco Certified Network Associate Security (CCNA Security)
    • Cisco Certified Network Professional (CCNP) Certification
    • Cisco Certified Network Professional Security (CCNP Security)
    • Cisco Firewall Security Specialist
    • Cisco Intrusion Prevention System (IPS) Specialist
    • Cisco IOS Security Specialist
    • Cisco Network Admission Control Specialist
    • Cisco Virtual Private Network (VPN) Security Specialist
    • CMIIS (CMII Software) Certification
    • CompTIA Advanced Security Practitioner (CASP)
    • CompTIA Cloud Essentials
    • CompTIA Linux+
    • CompTIA Network+
    • CompTIA Security+
    • Cybersecurity Forensic Analyst (CSFA) Certification
    • e-Certified Knowledge Manager (eCKM)
    • E-Certified Knowledge Practitioner
    • E-Certified Knowledge Specialist
    • GIAC Assessing and Auditing Wireless Networks (GAWN)
    • GIAC Certified Enterprise Defender (GCED)
    • GIAC Certified Firewall Analyst (GCFW)
    • GIAC Certified Forensic Analyst (GCFA)
    • GIAC Certified Forensic Examiner (GCFE)
    • GIAC Certified Incident Handler (GCIH)
    • GIAC Certified Intrusion Analyst (GCIA)
    • GIAC Certified Project Manager (GCPM)
    • GIAC Certified UNIX Security Administrator (GCUX)
    • GIAC Certified Web Application Defender (GWEB)
    • GIAC Certified Windows Security Administrator (GCWN)
    • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
    • GIAC Information Security Fundamentals (GISF)
    • GIAC Information Security Professional (GISP)
    • GIAC Legal Issues in Information Technology & Security (GLEG)
    • GIAC Penetration Tester (GPEN)
    • GIAC Reverse Engineering Malware (GREM)
    • GIAC Secure Software Programmer – .Net (GSP-.Net)
    • GIAC Secure Software Programmer – Java (GSSP-JAVA)
    • GIAC Security Essentials Certification (GSEC)
    • GIAC Security Leadership Certification (GSLC)
    • GIAC Systems and Network Auditor (GSNA)
    • GIAC Web Application Penetration Tester (GWAPT)
    • Master Certified Knowledge Managment Professional (MKMP)
    • Social Media Security Professional
    • U.S. Army Career Program 36 (CP36)
    • U.S. Army Functional Area 57 (FA57)
    • Wireless Communication Engineering Technologies (WCET) Certification

    Reference Documents

    • US-CERT CISA: Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad
    • NIST Invites Comments on Draft Special Publication (SP) 800-207, Zero Trust Architecture
    • DOD Digital Modernization Strategy
    • Executive Order on America’s Cybersecurity Workforce
    • Worldwide Threat Assessment of the US Intelligence Community
    • National Cyber Strategy – September 2018
    • NIST Releases Draft Update of the Risk Management Framework: Special Publication 800-37 Revision 2
    • Report on Post-Quantum Cryptography
    • Framework for Improving Critical Infrastructure Cybersecurity Version 1.1
    • NIST SP 500-325, Fog Computing Conceptual Model
    • NIST Releases the Second Public Draft of Special Publication (SP) 800-125A, Security Recommendations for Hypervisor Deployment
    • NISTIR 8011 Automation Support for Security Control Assessments – Volume 2: Hardware Asset Management
    • NISTIR 8011 Automation Support for Security Control Assessments – Volume 1: Overview
    • NISTIR 8170 DRAFT – The Cybersecurity Framework: Implementation Guidance for Federal Agencies
    • Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
    • DHS Study on Mobile Device Security
    • Report on Lightweight Cryptography
    • Symantec Ransomware Report
    • NJ Cybersecurity Ransomware Threat Profiles
    • The ICIT Ransomware Report
    • Tackling the Ransomware Threat
    • Ransomware Local Government Management Guide
    • Understanding Crypto-Ransomware
    • CERT Insider Threat Publications
    • The Insider Threat: An Introduction to Detecting and Deterring an Insider Spy
    • Comply to Connect
    • Benjamin Foulois Cyber Proving Ground (CPG)
    • Cyber Supply Chain
    • NIST Special Publication 800-171, Revision 1, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
    • GRIZZLY STEPPE – Russian Malicious Cyber Activity
    • NIST – Safer, Less Vulnerable Software Is the Goal of New NIST Computer Publication
    • Marking Controlled Unclassified Information Rev 1.1 (Marking Handbook)
    • Common Sense Guide to Mitigating Insider Threats, Fifth Edition
    • NIST Releases Baldrige-Based Tool for Cybersecurity Excellence
    • Controlled Unclassified Information (CUI) Notice 2016-01: Implementation Guidance for the Controlled Unclassified Information Program
    • Information on Current and Future States of Cybersecurity in the Digital Economy
    • Intelligence Information Sharing
    • Promoting Private Sector Cybersecurity Information Sharing
    • National Strategy for Information Sharing And Safeguarding
    • Cyber Threat Intelligence Integration Center
    • White House Summit on Cybersecurity and Consumer Protection
    • Middle Class Economics: Cybersecurity
    • The Comprehensive National Cybersecurity Initiative
    • Cyber-Insurance Metrics and Impact on Cyber-Security
    • International Strategy for Cyberspace
    • Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information
    • Presidential Policy Directive: Critical Infrastructure Security and Resilience
    • Presidential Policy Directive Signals Intelligence Activities
    • Cybersecurity National Action Plan
    • New Commitments to Accelerate the Safe Integration of Unmanned Aircraft Systems
    • United States Cyber Incident Coordination
    • Digital Signature Standard (DSS)
    • Secure Hash Standard (SHS)
    • Mobile Application Sign-On For Public Safety And Public Responders
    • DRAFT The Technical Specification for the Security Content Automation Protocol (SCAP)
    • DRAFT [Concept Paper] Identity and Access Management for Smart Home Devices
    • DRAFT Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist
    • DRAFT SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash
    • Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)
    • DoD Information Analysis Centers (IAC) Multiple Award Contract (MAC) Government-Industry Day Presentation
    • NIST Released the Second Draft Special Publication (SP) 800-160, Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems
    • An Insider Threat Indicator Ontology
    • DOD CIO, Through DISA, Releases Cloud Security Requirements Guide Update
    • ICS-CERT Advisory (ICSA-16-070-01) Schneider Electric Telvent RTU Improper Ethernet Frame Padding Vulnerability
    • Safety-Critical (SC) Systems
    • Monitoring Software-Intensive System Acquisition (SISA) Programs
    • Managing Operational Resilience
    • Managing Intellectual Property in the Acquisition of Software-Intensive Systems
    • Agile at Scale (AAS)
    • NIST Released Draft Special Publication 800-180, NIST Definition of Microservices, Application Containers and System Virtual Machines
    • FAA Unveils Effort to Expand the Safe Integration of Unmanned Aircraft
    • Federal Aviation Administration: B4UFLY Smartphone App
    • NIST announces the Release of Special Publication 800-57 Part 1 Revision 4, Recommendation for Key Management, Part 1: General
    • NIST Released NIST Interagency Report (NISTIR) 8055, Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research
    • IAD CNSA Suite and Quantum Computing FAQ
    • NIST Released the Second Draft Special Publication 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation
    • NIST Announces: Draft NISTIR 8011, Automation Support for Security Control Assessments – Volume 1: Overview and Volume 2: Hardware Asset Management
    • NIST Released the following 2 Draft Special Publications (SP): (1) Draft Special Publication (SP) 800-156, Representation of PIV Chain-of-Trust for Import and Export, and (2) Draft Special Publication 800-116 Revision 1, A Recommendation for the Use of PI
    • SP 800-152 (Third Draft) A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS)
    • DoD Cybersecurity T&E Guidebook
    • DoD Program Manager’s Guidebook for Integrating the Cybersecurity Risk Management Framework (RMF) into the System Acquisition Lifecycle
    • NIST Announced the Withdrawal of Six Federal Information Processing Standards
    • NIST Computer Security Division Plans to update Special Publication 800-126 and also design SCAP 1.3
    • NIST SP 800-73-4: Interfaces for Personal Identity Verification
    • NIST Interagency Report (NISTIR) 8014, Considerations for Identity Management in Public Safety Mobile Networks
    • NPS: Unmanned Systems Sentinel Summary
    • Department of Defense (DoD)-Defense Industrial Base (DIB) Cybersecurity (CS) Activities
    • NIST IR 8074: DRAFT Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity
    • NIST IR 8053 DRAFT De-Identification of Personally Identifiable Information
    • DOT&E FY2014 Annual Report
    • NIST Requests Comments on FIPS 186-4, Digital Signature Standard
    • DISA Best Practices Guide for DoD Cloud Mission Owners
    • NIST IR 7904 DRAFT (Second Draft) Trusted Geolocation in the Cloud: Proof of Concept Implementation
    • NIST SP 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification
    • NIST SP 800-171 DRAFT Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations (Final Public Draft)
    • FEDERAL FACILITY CYBERSECURITY: DHS and GSA Should Address Cyber Risk to Building and Access Control Systems
    • US CERT- Alert (TA15-286A) Dridex P2P Malware
    • NIST Requests Comments on Using ISO/IEC 19790:2012 as the U.S. Federal Standard for Cryptographic Modules
    • NISTIR 7863: Cardholder Authentication for the PIV Digital Signature Key
    • The Department of Defense Cyber Strategy
    • NIST IR 8060 DRAFT Guidelines for the Creation of Interoperable Software Identification (SWID) Tags
    • Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies
    • NIST IR 8060 DRAFT (Second Draft) Guidelines for the Creation of Interoperable Software Identification (SWID) Tags
    • NIST SP 800-82 Revision 2, Guide to Industrial Control Systems (ICS) Security
    • NIST SP 800-161 – Supply Chain Risk Management Practices for Federal Information Systems and Organizations
    • NIST RFI – Views on the Framework for Improving Critical Infrastructure Cybersecurity
    • NIST Cryptographic Standards and Guidelines Development Process (Second Draft)
    • NIST Special Publication 800-176, 2014 Computer Security Division Annual Report
    • NIST Computer Security Resource: Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard
    • Preferred Use of DoD Information Analysis Center Contracts
    • Operation of the Defense Acquisition System
    • NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations
    • NIST Special Publication 800-88, Revision 1, Guidelines for Media Sanitization
    • Combating the Insider Threat
    • DoDI 8500.02
    • NIST Special Publication 800-88 Guidelines for Media Sanitization
    • US-CERT Bulletins
    • Cyber Security of Critical Infrastructure
    • CNSS Advisory Memorandum Information Assurance
    • US-CERT Alerts
    • Department of Defense (DoD) Senate Appropriations Bill
    • RIAC SPECIAL ISSUE: DoD BETTER BUYING POWER
    • NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations
    • Special Publications (sp) – (800 series)
    • Security Configuration Guides (Operating Systems)
    • Security Configuration Guides (Applications)
    • System Level IA Guidance
    • Security Configuration Guides (Fact Sheets)
    • Security Configuration Guides (Archived Security Configuration Guides)
    • Security Configuration Guides (Industrial Control Systems (ICS))
    • Guidance, Rationale, & Interoperability Modalities for the RPR FOM (GRIM 1.0)
    • Systems and Software Engineering – System Life Cycle Processes
    • A Case Study for Better Buying Power: Information Analysis Centers of the Defense Technical Information Center
    • Information Technology – SEDRIS – Part 3: Transmittal Format Binary Encoding
    • Information Technology — Process Assessment — Part 6: An Exemplar System Life Cycle Process Assessment Model
    • Information Technology – Computer Graphics, Image Processing and Environmental Data Representation – Environmental Data Coding Specification (EDCS) Language Bindings – Part 4: C
    • Quality Management Systems – Requirements
    • Information Technology – Software Engineering – Guidelines for the Adoption of CASE Tools
    • Information Technology – Process Assessment – Part 7: Assessment of Organizational Maturity
    • IEEE Standard for System and Software Verification and Validation
    • Information Technology — Computer Graphics and Image Processing – Spatial Reference Model (SRM) Language Bindings – Part 4: C
    • Systems and Software Engineering – Measurement Process
    • Information Technology — Process Assessment — Part 8: An Exemplar Process Assessment Model for IT Service Management
    • An Illustration of the Concepts of Verification and Validation in Computational Solid Mechanics
    • Information Technology — SEDRIS — Part 2: Abstract Transmittal Format
    • Systems and Software Engineering — Life Cycle Processes — Risk Management
    • Information Technology – Process Assessment – Part 5: An Exemplar Software Life Cycle Process Assessment Model
    • Software Engineering – Recommended Practice for the Internet – Web Site Engineering, Web Site Management, and Web Site Life Cycle
    • Space Data and Information Transfer Systems – Open Archival Information System (OAIS) – Reference Model
    • IEEE Standard for Configuration Management in Systems and Software Engineering
    • 3GPP LTE Security Aspects
    • Software Engineering — COSMIC: a Functional Size Measurement Method
    • Systems and Software Engineering — Life Cycle Management — Part 3: Guide to the Application of ISO/IEC 12207
    • Information Technology – Process Assessment – Part 10: Safety Extension
    • IEEE Standard for Software and System Test Documentation
    • Information Technology – SEDRIS Language Bindings – Part 4: C
    • Information and Documentation – Managing metadata for records – Part 3: Self-assessment Method
    • Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – System and Software Quality Models
    • Information technology – SEDRIS – Part 1: Functional specification
    • Software Engineering – Software Life Cycle Processes – Maintenance
    • Information technology – Environmental Data Coding Specification (EDCS)
    • Systems and software engineering – Systems and software assurance – Part 3: System integrity levels
    • IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) – Object Model Template (OMT) Specification – Redline
    • Information technology – Process assessment – Part 9: Target process profiles
    • CUI Compliance Plans Overview and Recommendations for Departments and Agencies
    • Executive Order 13556 “Controlled Unclassified Information”
    • The DoDAF Architecture Framework Version 2.02
    • IEEE Recommended Practice for Distributed Simulation Engineering and Execution Process (DSEEP)
    • Information technology — Computer graphics and image processing – The Virtual Reality Modeling Language – Part 1: Functional specification and UTF-8 encoding
    • Commercial Off-the-Shelf (COTS) Simulation Package Interoperability (CSPI) Reference Models
    • IEEE Standard Classification for Software Anomalies
    • IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) – Framework and Rules
    • IEEE Recommended Practice for Distributed Interactive Simulation Verification, Validation, and Accreditation
    • IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) – Federate Interface Specification
    • Core Manufacturing Simulation Data (CMSD)
    • Information and documentation – Records management processes – Metadata for records – Part 1: Principles
    • Information technology – Spatial Reference Model (SRM)
    • IEEE Standard for Information Technology – System and Software Life Cycle Processes – Reuse Processes
    • Information technology – Open Distributed Processing – Unified Modeling Language (UML) Version 1.4.2
    • Insider Risk Evaluation and Audit
    • Best Practices for Mitigating and Investigating Insider Threats – Raytheon Whitepaper
    • Information and documentation – Managing metadata for records – Part 2: Conceptual and Implementation Issues
    • Software and systems engineering – Software measurement – IFPUG functional size measurement method 2009
    • Information technology — Process assessment — Part 4: Guidance on use for process improvement and process capability determination
    • IEEE Standard for Information Technology-Systems Design- Software Design Descriptions
    • IEEE Standard for CASE Tool Interconnections-Reference Model for Specifying System Behavior
    • Information technology — Process assessment — Part 2: Performing an assessment
    • Software engineering – Guidelines for the application of ISO 9001:2000 to computer software
    • Military Scenario Definition Language (MSDL)
    • Software engineering – Mk II Function Point Analysis – Counting Practices Manual
    • Information and Documentation – Work Process Analysis for Records
    • Information technology – Process assessment – Part 1: Concepts and vocabulary
    • ISO/IEC/IEEE Standard for Systems and Software Engineering – Software Life Cycle Processes
    • Information technology – Security techniques – Systems Security Engineering – Capability Maturity Model (SSE-CMM)
    • IEEE Standard for Software Reviews and Audits
    • IT Security Guidelines
    • IEEE Standard. Adoption of International Standard ISO/IEC 12119: 1994(E). Information Technology – Software Packages – Quality Requirements and Testing
    • IEEE Recommended Practice for CASE Tool Interconnection – Characterization of Interconnections
    • Information technology – Process assessment – Part 3: Guidance on performing an assessment
    • IEEE Recommended Practice for Verification, Validation, and Accreditation of a Federationan Overlay to the High Level Architecture Federation Development and Execution Process
    • Federal Information Processing Standards Publication 200, Minimum Security Requirements for Federal Information and Information Systems
    • Base Object Model (BOM) Template Specification
    • Guide for BOM Use and Implementation
    • IEEE Standard for Developing a Software Project Life Cycle Process
    • Standard for: Link16 Simulations
    • IEEE Standard Dictionary of Measures of the Software Aspects of Dependability
    • Ten Tales of Betrayal: The Threat to Corporate Infrastructures by Information Technology Insiders Analysis and Observations
    • Knowledge management – a guide
    • IEEE Standard for CASE Tool Interconnections-Reference Model for Specifying Software Behavior
    • Dynamic Link Compatible HLA API Standard for the HLA Interface Specification Version 1.3
    • Dynamic Link Compatible HLA API Standard for the HLA Interface Specification (IEEE 1516.1 Version)
    • Federal Information Processing Standards Publication 199, Standards for Security Categorization of Federal Information and Information Systems
    • IEEE Recommended Practice for High Level Architecture (HLA) Federation Development and Execution Process (FEDEP)
    • IEEE Guide for CASE Tool Interconnections – Classification and Description
    • IEEE Standard for Software User Documentation
    • IEEE Guide for Information Technology – System Definition – Concept of Operations (ConOps) Document
    • IEEE Recommended Practice for Software Requirements Specifications
    • IEEE Guide for Developing System Requirements Specifications
    • IEEE Standard for Software Quality Assurance Plans
    • Information Technology – Guideline for the Evaluation and Selection of CASE Tools
    • IEEE Standard for Functional Modeling Language – Syntax and Semantics for IDEF0
    • Implementation note for IEEE adoption of ISO/IEC 14143-1:1998. Information technology – software measurement – functional size measurement. Part 1: definition of concepts
    • IEEE Standard for Distributed Interactive Simulation – Application Protocols
    • IEEE Recommended Practice for Software Acquisition
    • IEEE Standard for Software Unit Testing
    • IEEE Standard for Conceptual Modeling Language Syntax and Semantics for IDEF1X/Sub 97/ (IDEF/Sub Object/)
    • Software Test Description (STD)
    • Real-time Platform Reference Federation Object Model (RPR FOM 1.0)
    • IEEE Standard for a Software Quality Metrics Methodology

    CSIAC Reports

    • Privacy Impact Assessment: The Foundation for Managing Privacy Risk
    • Smart Cities, Smart Bases and Secure Cloud Architecture for Resiliency by Design
    • Hypergaming for Cyber – Strategy for Gaming a Wicked Problem
    • Evolving Developments in Cyberlaw: February 2020
    • Cybersecurity Issues for Security Managers: 2019
    • The Internet of Things and the “Next War”
    • Security-Conscious Password Behavior from the End-User’s Perspective
    • Examination of Emotet’s Activities: TrickBot Takes Over as Top Organizational Threat
    • Evolving Developments in Cyberlaw: June 2019
    • Data Manipulation
    • JFAC/DAU/CSIAC Cyber Experiment (CYBEX)
    • Reducing Your Digital Footprint
    • Emerging Developments in Cyberlaw: 2019
    • 5th Generation (5G) Technology White Paper
    • Malvertising Explored
    • Cultivating Cybersecurity Talent Internally
    • Learning to Win: Making the Case for Autonomous Cyber Security Solutions
    • Knowledge Temple of Decision Making
    • Recent Developments in Cyberlaw: 2018
    • Mobile Security
    • Cloud Infrastructure Deployment
    • Defense Acquisition University Secure Systems Design Course Experiment
    • Automation and Ongoing Authorization Transition/Implementation
    • Challenges in Applying the Law of Armed Conflict to Cyberwar
    • Evolving Developments in Cyberlaw: 2017
    • Cloud Computing for the Government Sector
    • Handbook of Software Reliability and Security Testing
    • Insider Threat Workshop Proceedings: Papers and Presentations from the CSIAC Insider Threat Workshop
    • Firewalls
    • Vulnerability Assessment
    • Use of Mobile Technology for Information Collection & Dissemination
    • Cloud Computing in the Government
    • Risk Management for the Off-the-Shelf (OTS) Information Communications Technology (ICT) Supply Chain
    • Malware
    • Measuring Cyber Security and Information Assurance
    • Enhancing the Development Life Cycle to Produce Secure Software
    • The Insider Threat to Information Systems
    • Software Project Management for Software Assurance
    • A Business Case for Software Process Improvement (2007 Update), Measuring Return on Investment from Software Engineering and Management
    • Software Security Assurance
    • A Comprehensive Review of Common Needs and Capability Gaps
    • Software Acquisition Gold Practice: Track Earned Value
    • Wireless Wide Area Network (WWAN) Security
    • Embedded Software Maintenance
    • Agile Software Development
    • Network Centric Warfare
    • Exploring Biotechnology: Opportunities for the Department of Defense
    • Malicious Code
    • Software Tools for Knowledge Management
    • Knowledge Management in Software Engineering
    • Verification, Validation, and Accreditation (VV&A) Automated Support Tools, A State of the Art Report: Part 2 – Details
    • Modeling and Simulation for Information Assurance
    • Configuration Management Compliance Validation
    • COTS Based Software Development and Integration
    • Using Cost Benefit Analyses to Develop Software Process Improvement (SPI) Strategies
    • IA Metrics
    • Verification, Validation, and Accreditation (VV&A) Automated Support Tools, A State of the Art Report: Part 1 – Overview
    • Defense In Depth
    • Data Mining
    • Mining Software Engineering Data: A Survey
    • Data Embedding for Information Assurance
    • Object-Oriented Database Management Systems Revisited
    • Using Defect Tracking and Analysis to Improve Software Quality
    • Understanding and Improving Technology Transfer in Software Engineering
    • Modern Empirical Cost and Schedule Estimation Tools
    • An Analysis of Two Formal Methods: VDM and Z
    • Software Interoperability
    • A History of Software Measurement at Rome Laboratory
    • Software Engineering Baselines
    • Technology Transfer Across the Internet
    • Software Requirements: A Tutorial
    • Electronic Publishing on the World Wide Web: An Engineering Approach
    • Analyzing Quantitative Data Through the Web
    • The Present Value of Software Maintenance
    • Software Design Methods
    • Rome Laboratory Research in Software Measurement: A DACS Custom Bibliographic Search
    • A Review of Non-Ada to Ada Conversion
    • A Review of Formal Methods
    • A State of the Art Review of Distributed Database Technology
    • Artificial Neural Networks Technology
    • Software Prototyping and Requirements Engineering
    • Software Analysis and Test Technologies
    • An Overview of Object Oriented Design

    Journal Issues

    • Data-Centric Environment Rise of Internet-Based Modern Warfare “iWar” – Survivability, Availability and Accessibility without Geographic Borders
    • M&S Applied Across Broad Spectrum Defense and Federal Endeavors
    • Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)
    • Artificial Intelligence: “The Next – Nuclear Arms Race – Space Race – To the Edge”
    • Launching Innovation Through Medical Modeling and Simulation Technologies Special Edition
    • Innovation Based Ecosystems
    • Cyber-As-Zoo: Multidisciplinary Cyber Struggle
    • Insider Threat and the Malicious Insider Threat
    • Serious Games to Enhance Defense Capabilities – Modeling & Simulation Special Edition
    • Tools & Testing Techniques for Assured Software – DoD Software Assurance Community of Practice: Volume 2
    • Design and Development Process for Assured Software – DoD Software Assurance Community of Practice: Volume 1
    • Cyber Science & Technology at the Army Research Laboratory (ARL)
    • Modeling and Simulation Special Edition: Wargaming
    • Basic Complexity
    • Focus on Air Force Research Laboratory’s Information Directorate
    • Modeling & Simulation Special Edition
    • Early Prevention & Best Practices
    • Applying Modeling & Simulation for Defense
    • Games People Play Behavior and Security
    • Knowledge Management
    • Understanding Cyber Risks and Security Management
    • Supervisory Control and Data Acquisition
    • Secure Systems and Software Productivity
    • Welcome to the CSIAC
    • IA on a Tight Budget
    • Social Media Malware
    • Cost Estimation & Systems Acquisition
    • Information Assurance: Then, Now, and Moving Forward
    • Cloud Computing
    • Security Automation: Addressing Operational Problems
    • Analyzing and Measuring Information Quality
    • IA in Acquisition
    • Web Technology Initatives in the Government
    • International Information Assurance
    • DoD and Open Source Software
    • Cyber Forensics in the Cloud
    • Welcome to the New DACS
    • Privacy and Enhanced Information Security
    • A New Layer of Security
    • Defensive Cyber Security: Policies and Procedures
    • Software Quality, Reliability, and Error Prediction
    • Cloud Computing: Silver Lining or Storm Ahead?
    • Model-Driven Development
    • Security Automation: A New Approach to Managing and Protecting Critical Information
    • Overcoming Cyber IA Challenges Through Better IA Policy Development and Implementation
    • Information Assurance (IA) Challenges in an International Environment
    • Project Management: Managing For Success
    • Software Testing: A Lifecycle Perspective
    • DoD Techipedia… A Way to Collaborate
    • Earned Value Management: Keeping Your Project On Track
    • Making GIG IA Architecture Real with AFG
    • Phishing Warfare Against Armed Forces
    • DoD Software Technology Challenges
    • New Directions in Software Estimation
    • Guarding the Cybercastle in 2020
    • Intellectual Property and Software
    • Defining the GIG Core
    • Service-Oriented Architecture (SOA)
    • Network Risk Assessment Tool (NRAT)
    • Information Assurance for the Net-Centric Environment: Making the Mission Possible
    • Future Directions in Software Engineering
    • Implementing Internet Protocol Version 6 (IPv6) on an Army Installation
    • System Engineering for the GIG: An Approach at the Enterprise Level
    • Open Source
    • Look out! It’s the Fuzz
    • Performance Results from Process Improvement
    • Phishing: Fraud for the 21st Century
    • Net-Centric Software Architecture
    • SAMATE’s Contribution to Information Assurance
    • Generating Policies for Defense in Depth
    • Functional Sizing of Real-time & Embedded Systems
    • Processing Data to Construct Practical Visualizations for Network Security
    • Functional Size Measurement
    • Impact of International Information Assurance (IA) Standardization
    • Measurement
    • Net-Centric Assured Information Sharing – Moving Security to the Edge through Dynamic Certification & Accreditation
    • Software Archaeology
    • Secure Software Engineering
    • IA Strategy: The Plan and Your Role
    • Common Technology Needs and Capability Gaps Across DoD’s IA and CND Communities
    • Total Electronic Migration System
    • The Cyber Conflict Studies Association
    • Software Reliabilty Engineering
    • Ontology Development Challenges and Applications Using the DARPA Agent Markup Language (DAML)
    • Software Cost, Quality and Productivity Benchmarks
    • Grid Computing
    • Information Assurance (IA) and Peer-to-Peer File Sharing
    • The National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide
    • A New Strategy – A New USSTRATCOM
    • Software Quality
    • The Peter Kiewit Institute (PKI)
    • Training and Preparing for Net-Centric Warfare
    • Topics in Software Engineering
    • Growing Up With Guns” A Cultural Education and the Information Age
    • Return-On-Investment from Software Process Improvement
    • Security Benchmarks: A Gold Standard
    • Experience Based Management
    • Trust in Cyberspace?
    • Software Engineering Education
    • Information Systems Security Incident Response
    • Software Agents Part 2
    • Cyber Terror: Potential for Mass Effect
    • Software Agents
    • FAA
    • CERT/CC: Tracking, Preventing & Resolving Computer Security Incidents
    • Information Analysis Center (IAC) Program Overview
    • Modeling & Simulation
    • SPACECOM
    • High Performance Computing HPC
    • A Software Engineering Course for Trustworthy Software
    • USPACOM Theater Network Operations
    • Warfighter Support in a Coalition Environment
    • Defense in Depth
    • Testing Software Based Systems: The Final Frontier
    • USSOUTHCOM
    • Newsletter Series: Software Testing
    • Coalition IA
    • Win Win: A System for Negotiating Requirements
    • COTS Software: Five Key Implications for the System Architect
    • JTF-CND
    • The Defense-Wide Information Assurance Program
    • Risk Management Map
    • Incorporating IA into GLOBAL GUARDIAN
    • Defending Against C2W and IW Attack
    • Rapid Application Development (RAD): A Brief Overview
    • DIA Support to Information Operations
    • Information Assurance: The Road to 2010
    • Earned Value (EV) and Automated Information Systems (AIS)
    • DACS Named the DoD Software Information Clearinghouse
    • DACS Newsletter Summer 1996
    • DACS Newsletter Spring 1996
    • DACS Newsletter Fall 1995
    • DACS Newsletter Summer 1995
    • DACS Newsletter Spring 1995
    • DACS Newsletter Winter 1993
    • DACS Newsletter Fall 1993
    • DACS Newsletter Summer 1993
    • DACS Newsletter

    Journal Articles

    • Can the “Gorilla” Deliver? Assessing the Security of Google’s New “Thread” Internet of Things (IoT) Protocol
    • Rebooting Letters of Marque for Private Sector Active Cyber Defense
    • Evaluation of Comprehensive Taxonomies for Information Technology Threats
    • Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers
    • Optimizing for Mission Success Using a Stochastic Gaming Simulation
    • Enabling Joint Synthetic Training Interoperability through Joint Federated Common Data Services
    • View and Viewpoint Based Digital Signoff using OpenMBEE as an Authoritative Source of Truth
    • Hybrid Network Emulation with Cyber and Electronic Warfare Effects
    • Reconfigurable Signal-Injection Missile Simulation (RSIMS)
    • AFSIM: The Air Force Research Laboratory’s Approach to Making M&S Ubiquitous in the Weapon System Concept Development Process
    • Journal Issue Overview – M&S Applied Across Broad Spectrum Defense and Federal Endeavors
    • Addressing Both Sides of the Cybersecurity Equation
    • Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS)
    • Practical Industrial Control System (ICS) Cybersecurity: IT and OT Have Converged – Discover and Defend Your Assets
    • Applying Cyber Threat Intelligence to Industrial Control Systems
    • Gaining Endpoint Log Visibility in ICS Environments
    • Artificial Intelligence the Next “Nuclear Arms Race” – “Space Race To The Edge”
    • Staying Ahead of the Race – Quantum Computing and Cybersecurity
    • Features and Operation of an Autonomous Agent for Cyber Defense
    • Cloud Security Monitoring with AI-ML Infused Technologies
    • Launching Innovation through Medical Modeling and Simulation Technologies
    • High-Fidelity Surgical Fasciotomy Simulator for Training Special Operations Medics
    • Saving Female Lives using Simulation: Elevating the Training Experience
    • Capabilities of the Naval Medical Center Portsmouth Medical Simulation Center
    • Navy Medical Modeling and Simulation in a DHA-Service World
    • Providing Cyber Situational Awareness on Defense Platform Networks
    • Game Theoretic Modeling of Advanced Persistent Threat in Internet of Things
    • Software Defined Networking for Army’s Tactical Network: Promises, Challenges, and an Architectural Approach
    • A New Reality: Modelling & Simulation as a Service
    • Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments
    • The Elusive Nature of “Key Cyber Terrain”
    • Cyber Operational Architecture Training System – Cyber for All
    • Enduring, Fleeting, Future: A brief overview of current sentiment and emotional analysis, a look forward
    • A Collaboration Pipeline for Cybersecurity Research, Analytics, and Tools
    • Cybersecurity Competency Assessment Using Augmented Qualification Standards
    • Cyber-As-Zoo: Multidisciplinary Cyber Struggle
    • Detect, Contain and Control Cyberthreats
    • Offensive Intrusion Analysis: Uncovering Insiders with Threat Hunting and Active Defense
    • Accessing the Inaccessible: Incident Investigation in a World of Embedded Devices
    • Compliant but not Secure: Why PCI-Certified Companies Are Being Breached
    • Extensions to Carnegie-Mellon University’s Malicious Insider Ontology to Model Human Error
    • Introduction: Insider Threat and the Malicious Insider Threat – Analyze. Deter. Discover. Prevent. Respond
    • Early Synthetic Prototyping Digital Warfighting For Systems Engineering
    • Crowd-Driven Tactical Decision Game: Training Tactical Creativity
    • Serious Gaming Design for Adaptability Training of Military Personnel
    • Learning Cyber Operations Through Gaming: An overview of current and up and coming gamified learning environments
    • Introduction to Serious Games to Enhance Defense Capabilities – Modeling & Simulation Special Edition
    • Piloting Software Assurance Tools in the Department of Defense
    • The Software Assurance State-of-the-Art Resource
    • Engineering Software Assurance into Weapons Systems During the DoD Acquisition Life Cycle
    • Software Assurance Measurement – Establishing a Confidence that Security is Sufficient
    • Software Assurance Adoption through Open Source Tools
    • Improving Software Assurance through Static Analysis Tool Expositions
    • SARD: Thousands of Reference Programs for Software Assurance
    • Introduction to Tools & Testing Techniques for Assured Software – DoD Software Assurance Community of Practice: Volume 2
    • Cyber Risk to Transportation Industrial Control Systems
    • First Consolidated Basic Center Operations Contract to Quanterion
    • Air Force Research Laboratory’s In-Residence Professor Becomes Cybersecurity Preceptor in South Korea
    • Shaping Preventive Policy in “Cyber War” and Cyber Security: A Pragmatic Approach
    • Securing Systems through Software Reliability Engineering
    • Signcryption for Biometric Security
    • Cyber Security… the Virtual Frontier
    • Welcome to the New and Enhanced Cyber Security and Information Systems Information Analysis Center – CSIAC
    • Software productivity progress during the first decade of the 21st Century: Quantifying productivity
    • Advances in the Acquisition of Secure Systems Based on Open Architectures
    • Development and Transition of the SEI Software Assurance Curriculum
    • Defense Technical Information Center’s (DTIC’s) Hidden Gems
    • Is Our Software REALLY Secure?
    • Hacker 101 & Secure Coding: A Grassroots Movement towards Software Assurance
    • Software Assurance in The Agile Software Development Lifecycle
    • Keys to Successful DoD Software Project Execution
    • Introduction to Design and Development Process for Assured Software – DoD Software Assurance Community of Practice: Volume 1
    • Risk Analysis with Execution-Based Model Generation
    • Information Security Continuous Monitoring (ISCM)
    • Security of Cyber-Physical Systems
    • Synergistic Architecture for Human-Machine Intrusion Detection
    • Machine Learning and Network Intrusion Detection: Results from Grammatical Inference
    • The Cyber Security Collaborative Research Alliance: Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making
    • Cyber Science and Technology at the Army Research Laboratory
    • Adjudication in Wargaming for Discovery
    • Computer Assisted Military Wargaming: The SWIFT Wargame Tool
    • Wargaming at the Naval Postgraduate School
    • Air Force Research Laboratory Innovation – Pushing the Envelope in Analytical Wargaming
    • M&S Support to Wargaming
    • Introduction to Modeling and Simulation Special Edition: Wargaming
    • Tech Views
    • One Side Now: The Need to Adopt a Business Systems Approach to Cloud Security
    • Automating Cloud Security Authorizations
    • Cloud Nine, Are we there yet?
    • Cloud Computing – How Easy is it?
    • Cloudonomics: A Rigorous Approach to Cloud Benefit Quantification
    • Quantum Key Distribution: Boon or Bust?
    • Computer Supported Training Solutions: Discussion of a New Framework for Effective Development and Deployment
    • Back to Basics: Firmware in NFV Security
    • Modeling and Simulation Data Integration – Inviting Complexity
    • Tech Views
    • Tech Views
    • Outcome-Based Acquisition
    • Parametric Modeling to Support System Acquisition
    • History is the Key to Estimation Success
    • A Roadmap for Reforming the DoD’s Acquisition of Information Technology
    • Selling Your Software Estimate
    • An Innovative Approach to Quantifying Uncertainty in Early Lifecycle Cost Estimation
    • DACS Software & Systems Cost and Performance Analysis Toolkit
    • Tech Views – Data as a Critical Service in Acquisition
    • Implementing Open Standards in Open Source
    • Military Open Source Community Growing
    • Tech Views
    • Additional OSS Resources
    • Running Open Technology Development Projects
    • Evaluating Open Source Software
    • Software is a Renewable Military Resource
    • Open Source Software Is Commercial
    • Publicly Releasing Open Source Software Developed for the U.S. Government
    • Application Specific Abstractions: A Research
    • Physics of Information Assurance
    • Networking Modeling and Simulation: Bridging the Gap from Theory to Field Tests
    • Cyber Deception
    • Air Force Research Laboratory / Information Directorate (Rome NY)
    • Cross-domain Transfer: Information Support Server Environment (ISSE)
    • The Junior Force Council: Reaching Out to New Employees
    • Bridging Fault Tolerance and Game Theory for Assuring Cyberspace
    • A Science of Network Configuration
    • Command and Control of Proactive Defense
    • Introduction
    • Case Study: Applying Agile Software Methods to Systems Engineering
    • Software Protection Against Side Channel Analysis Through a Hardware Level Power Difference Eliminating Mask
    • The Efficacy and Challenges of SCADA and Smart Grid Integration
    • 4G LTE Security for Mobile Network Operators
    • An Overview of the Schedule Compliance Risk Assessment Methodology (SCRAM)
    • Metrinome – Continuous Monitoring and Security Validation of Distributed Systems
    • Search…Backwards
    • BEC: Applying Behavioral Economics to Harden Cyberspace
    • BYOD Topic: How Complicated Can Calendars Be?
    • A Knowledge Management (KM) Primer
    • Cyber Profiling: Using Instant Messaging Author Writeprints for Cybercrime Investigations
    • BECO: Behavioral Economics of Cyberspace Operations
    • Toward Realistic Modeling Criteria of Games in Internet Security
    • How Does an Analyst Select M&S to Support the Entire DoD Acquisition Lifecycle Process?
    • Sensor Life Cycle Acquisition and Training with Modeling & Simulation
    • A Probability of 1
    • Achieving Information Dominance: Unleashing the Ozone Widget Framework
    • Increasing Assurance Levels Through Early Verification with Type Safety – Unabridged Version
    • Managing Operational Resilience
    • Looking at M&S Education Through the Prism of the Video Game Industry
    • Best Practices
    • Agile at Scale (AAS)
    • Increasing Assurance Levels Through Early Verification with Type Safety
    • Rediscover the Defense Modeling & Simulation Catalog
    • A Marine Take on Live, Virtual, and Constructive Initiatives
    • Director’s Introduction
    • Army Modeling and Simulation Enterprise
    • Air Force Analytics for Decision Support
    • The Need for “Acquisition Visibility”

    Authors & Presenters

    • Mark Barnell
    • Daniel Carbonaro
    • Kristopher Johnson
    • Dr. Carl Kutsche
    • Dr. Kamal T. Jabbour
    • Jessica Wilkerson
    • Dr. Allan Friedman
    • Dr. Joshua Alton Sipper
    • Ryan T. Moran
    • T.J. Minichillo
    • Dr. James Giordano
    • Linton Wells II, PhD
    • Dr. Brittany Kmush
    • Dr. Erica M. Mitchell
    • Ms. Aleksandra Scalco
    • Dr. Michael Chipley
    • Dr. William Waugaman
    • Mr. Lowell Usrey
    • Mr. Scott Pollack
    • Mr. Kenneth Frische
    • Dr. Tonya E. Thornton (Neaves)
    • Dr. Jose Romero-Mariona
    • Dr. Indu Singh
    • Dr. Lee McKnight
    • Mr. James B. Balocki
    • Mr. Kurt Jarvis
    • Dr. Carol Woody
    • Jim West
    • Colonel (Retired) Daniel T. Bennett, Ph.D.
    • Benjamin Kruse, Sc.D.
    • Kevin Gupton
    • Roy Scrudder
    • LTC John Dvorak
    • Kevin Hellman
    • Colonel Timothy D. West
    • Mr. Brian Birkmire
    • Mr. John Diem
    • Mark R. Blackburn, Ph. D
    • Roger D. Jones
    • Douglas Ray
    • Steven Hoffenson
    • Brian Chell
    • John Bennett
    • Brent Waggoner
    • Dr. Allison Newcomb
    • James Plastine
    • Alex Poylisher
    • Shridatt Sugrim
    • Frank Colon
    • Kenneth W. Strayer
    • Ryan J O’Grady
    • Steven M. Launius
    • Dr. Cory Merkel
    • Holly Dragoo
    • Alex MacDiarmid
    • Dr. Bertrand Cambou, PhD
    • Dr. Jim Fawcett
    • Farhat Shah
    • Dr. R. Scott Starsman
    • Michael Woudenberg
    • Anna Lena Fehlhaber
    • Stephen Dunlap
    • Mason Rice
    • Robert Mills
    • Matthew Sibiga
    • Mr. Donnie Wendt
    • Michael Hoffman
    • Mr. Daryl Haegley
    • Dean Parsons
    • Doug Wylie
    • Karen E. Roth
    • Nicolas M. Chaillan
    • Dr. Gale Pomper
    • Steve Warzala
    • Balaji Balakrishnan
    • Dr. Allison Newcomb
    • Michael J. De Lucia
    • Dr. Tyson Brooks
    • Adam Tagert
    • Charlie Merulla
    • Amanda J. Page
    • Crystal S. Maraj
    • Mark V. Mazzeo
    • Dr. Teresita M. Sotomayor
    • Angela M. Alban
    • Jack Norfleet
    • Richard J. Kelly
    • Jordan N. Coulter
    • Deborah N. Burgess
    • Dr. Michael D. Proctor
    • William Y. (Bill) Pike
    • Dr. Don Delorey
    • Joy Greer
    • Michael Spooner
    • Robert M. Selvester
    • Rob Cheng
    • Dr. Terry R. Merz, CISSP, CISM
    • Patrick M. Hayden
    • David K. Woolrich
    • Katie D. Sobolewski
    • Michael J. Weisman
    • Nandi O. Leslie
    • Dr. Cansever
    • Dr. Bharat Doshi
    • Tom Van Den Berg
    • Jon Lloyd
    • Robert Siegfried
    • Alfredo Hickman
    • Sara Meyer
    • M. G. Cole
    • Stephen Brewster
    • Dr. Rampaul Hollington
    • Cully Patch
    • Scott Musman
    • Stephen Raio
    • Mr. Giorgio Bertoli
    • Derek Bryan
    • Dr. David “Fuzzy” Wells
    • Dr. Wemlinger
    • Dr. Christopher Seedyk
    • Alexander Fielder
    • Monika Akbar
    • Salamah Salamah
    • Dr. Robert Wright
    • Neil Fitzpatrick
    • Tim Watkins
    • Dr. Kenneth E. Nidiffer
    • Matt Hosburgh
    • Eric Jodoin
    • Christian Moldes
    • Eric Cole, PhD
    • Dr. John W. Coffey
    • Roderick A. Nettles
    • Jordan Henry
    • Sarah N. Hostetler
    • Richard Boyd
    • Kevin Joyce
    • Michael VanSteenburg
    • Nicholas Maida
    • Yuzhe (Richard) Tang
    • James Rice
    • Dr. Robert Smith
    • Brian Vogt
    • Maj. Erik Douze
    • Floor Thönissen
    • Rudy Boonekamp
    • Jan Maarten Schraagen
    • Karel Van Den Bosch
    • Andrea Jetten
    • Esther Oprins
    • Anja van der Hulst
    • Yelim Mun
    • Frank DiGiovanni
    • Dr. P. Shane Gallagher
    • Fred Hartman
    • Ken Kaminski
    • Timothy A. Chick
    • Dr. Thomas P. Scanlon
    • Mr. Thomas Hurt
    • Dr. Scott M. Brown
    • Dr. Robert J. Ellison
    • Dr. Carol C. Woody
    • Patrick Hart
    • Corbin Moyer
    • Damien Cupif
    • Aurelien Delaitre
    • Charles D. De Oliveira
    • Elizabeth Fong
    • Vadim Okun
    • Terry S. Cohen
    • Paul E. Black
    • Robert Gold
    • Dr. Andrew Hurd
    • Von Welch
    • Barton Miller
    • Miron Livny
    • Rachael Orzechowski
    • Joe Weiss
    • Craig Jordan
    • Peter Foytik
    • Dr. Barry Ezell
    • Dr. Mike Robinson
    • Vijay Srinivas
    • Dr. Samuel Mantravadi
    • Nancy R. Mead
    • Francis “Frank” Mayer
    • Scott Nickeson
    • Roger Lamb
    • Paul McFall
    • Matt Hackman
    • Kolby Hoover
    • Joel McCormick
    • Jasen Moran
    • Joe Heil
    • Bradley Lanford
    • Carol Lee
    • Rebecca Onuskanich
    • Danfeng (Daphne) Yao
    • Reg Harnish
    • Tony Gillespie
    • Shiu-Kai Chin
    • Thomas Schreck
    • Curtis Arnold
    • Greg Weaver
    • Akhilomen Oniha
    • Dr. Edward Colbert
    • Xinming Ou
    • John Homer
    • Edgar Padilla
    • Jaime Acosta
    • Paul Yu
    • Dr. Noam Ben-Asher
    • Dr. Richard Harang
    • Ananthram Swami
    • Patrick McDaniel
    • Dr. Alexander Kott
    • Charles Turnitsa
    • Michael Ottenberg
    • Karl Selke
    • William Ellerbe
    • Jeff Kline
    • Robert E. Burks
    • Fred Cameron
    • Jeff Appleget
    • Jaime J. Bestard
    • John Lawson III
    • Mark Gorak
    • Dr. Josh White
    • Larry Clinton
    • Kaus Phaltankar
    • Tom Kwasniewski
    • Joe Weinman
    • Pauline Johnson
    • Tammie McClellan
    • Andrew Dolan
    • Robert Dora
    • Chris Oehmen
    • Michael Messuri
    • Gerald B. Baumgartner
    • Colin V. McLaughlin
    • Douglas D. Hodson
    • Logan O. Mailloux
    • Maj Matthew C. Denney
    • Dr. Amela Sadagic
    • Dr. Gary Allen
    • Sean Bird
    • Mike Corley
    • Dr. Thomas Dube
    • Lance James
    • Karen Miller
    • Peter Allor
    • Mark Woeppel
    • Paul Morrisseau
    • Jay Abraham
    • Russell Kegley
    • Jonathan Preston
    • Jules White
    • Douglas Schmidt
    • Carol Dekkers
    • Gary Gack
    • Rex Black
    • Larry H. Putnam Jr.
    • Joe Lofgren
    • Juan Carlos Molina
    • Karen McRitchie
    • Dan O’Neill
    • Edward Jones
    • Zbigniew Kalbarczyk
    • Randall Trzeciak
    • Trent Brunson
    • Mark Troutman
    • Richard Cook
    • James Henderson
    • Randy Trzeciak
    • Matthew Sweeney
    • Bruce Gabrielson
    • Thomas “TJ” Vestal
    • Gordon Morrison
    • Brian Baney
    • Qi Li
    • Dennis R. Goldenson
    • William Roetzheim
    • Arlene Minkiewicz
    • Roger Stewart
    • Lew Priven
    • John Dingman
    • Jo Ann Lane
    • Kate Armel
    • John M. Gilligan
    • Thomas McGibbon
    • Christopher Zember
    • Phillip Griffin
    • Paul Engelhart
    • Tony Guo
    • Dr. Kevin A. Kwiat
    • Preston MacDiarmid
    • Elfriede Dustin
    • Struan Clark
    • Thomas Alspaugh
    • Walt Scacchi
    • Jim Marcinkowski
    • Dr. David A. Wheeler
    • John Scott
    • J.C. Herz
    • Mr Mark Lucas
    • Kane McLean
    • Lawrence Rosen
    • Donald J. Reifer
    • Dr. Mark Addleson
    • Nupul Kukreja
    • Les Cardwell
    • Annie Shebanow
    • David A. Umphress
    • Capt John R. Bochert
    • Dr. Michael R. Grimaila
    • Dr. Yong C. Kim
    • Matthew Kennedy
    • Greg Metzler
    • Chet Hosmer
    • Mark Webb
    • Jim McCurley
    • Robert Stoddard
    • Dave Zubrow
    • Joshua White
    • Steve McConnell
    • Girish Seshagiri
    • Robert L. Nord
    • Brad Clark
    • Peter Feiler
    • Lawrence H. Brinker
    • Eric Treadwell
    • Michael Weir
    • Michael Atighetchi