CISA Urges Software Developers to Weed Out XSS Vulnerabilities

The CISA and the FBI recommended software developers to implement rigorous validation, sanitization, and input escaping to prevent malicious script injections and data manipulation.

White House Calls Attention to ‘Hard Problem’ of Securing Internet Traffic Routing

The White House advised network operators to implement Resource Public Key Infrastructure (RPKI) to enhance security, which involves digital certificates managed by Regional Internet Registries.

NIST Releases New Draft of Digital Identity Proofing Guidelines

The new draft of NIST's digital identity proofing guidelines includes updates to accommodate passkeys and mobile driver's licenses, as well as options for identification without using biometrics like facial recognition.

NSA Issues Guidance for Better Logging, Threat Detection to Prevent LotL Incidents

The NSA has released guidelines to improve logging and threat detection for Living-off-the-Land (LotL) attacks in cloud services, enterprise networks, mobile devices, and OT networks as part of a global effort for critical infrastructure security.

CISA Releases Guide to Enhance Software Security Evaluations

CISA has released a guide to enhance how organizations evaluate software manufacturers' security practices, emphasizing product security over enterprise security measures for defending against cyber threats.

New NSA AI-powered Tool Would Help Industry Optimize Cyber Defense Testing

The Autonomous Penetration Testing platform would replace much of the laborious, manual process of such testing, where organizations use vulnerability scanning tools and other methods to measure the robustness of their cyberdefenses against hackers

CISA Says Malicious Hackers are 'Taking Advantage' of CrowdStrike Outage

The U.S. cybersecurity agency CISA warned against clicking on suspicious links to prevent email compromise. Cybercriminals are already impersonating CrowdStrike in phishing emails, asking for payment to "fix the CrowdStrike apocalypse."

CISA Urges Software Makers to Eliminate OS Command Injection Flaws

The US government is pressuring software manufacturers to address operating system command injection vulnerabilities following high-profile threat actor campaigns exploiting these flaws in 2024.

UK Government Advises Best Practices for Embedded Device Security

The cybersecurity arm of the UK government, RITICS, has released a new guide to assist companies in enhancing the security of their operational technology (OT) and industrial control system (ICS) hardware.

Manufacturing Cybersecurity at Heart of New White House Guidance

The U.S. Department of Energy has released a new framework of best practices for securing clean energy cyber supply chains, focusing on key technologies used in managing electricity, oil, and natural gas systems.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags