Cybersecurity

Faster Patching Pace Validates CISA’s KEV Catalog Initiative

The Known Exploited Vulnerabilities (KEV) Catalog maintained by the US cybersecurity agency CISA has led to significant improvements in federal agencies’ patching efforts, with more than 1,000 vulnerabilities now included in the list. Launched in November 2021, the KEV Catalog lists flaws that CISA has proof are being exploited in malicious attacks, and is accompanied […]

Data Center

What is ENIAC? | Definition from TechTarget

What is ENIAC (Electronic Numerical Integrator And Computer)? ENIAC (Electronic Numerical Integrator And Computer) was the world’s first general-purpose electronic computer. ENIAC is also considered the world’s first programmable computer, although programming the computer was a complex, manual process that could take days. Even so, ENIAC was 1,000 times faster than anything else in existence […]

Cybersecurity

New Zealand university operating despite cyberattack

New Zealand’s third-largest university has been able to continue operating despite a cyberattack that forced officials to isolate affected servers. The Auckland University of Technology serves more than 29,000 students across three campuses in the country’s largest metropolitan area. Jeremy Scott, senior corporate communications manager at the university, told Recorded Future News that the school […]

Cybersecurity

Hidden dangers loom for subsea cables, the invisible infrastructure of the internet – Help Net Security

More than 97% of the world’s internet traffic passes through subsea cables at some point, according to ENISA. Subsea cables are a vital component of the global internet infrastructure, and it is critical to protect them from cyberattacks, physical attacks and other threats. What are the challenges? With the growing reliance on the internet, and […]

Cybersecurity

New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government

An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the region over extended periods of time. “While this activity occurred around the same time and in some instances even simultaneously on the same victims’ machines, each cluster is characterized by distinct tools, modus operandi, and […]