|
Registration is now open for Ability Summit
Explore the Ability Summit site for more information |
|
Registration is now open for Ability Summit
Explore the Ability Summit site for more information |
The
National
Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Automation of the
Cryptographic Module Validation Program (CMVP).
Release of this project description begins a process to further identify
project requirements, scope, and hardware and software components for use in a
laboratory environment.
The
NCCoE will solicit participation from industry to demonstrate first-party and
third-party tests and test tools for automation of the CMVP, as well as
first-party processes and means for communicating the results to NIST.
Increased automation is necessary because a number of elements of the current
validation processes are manual in nature, making third-party testing and
government validation of cryptographic modules often incompatible with industry
requirements. In addition to demonstrating tests, tools, and processes, this
project will also result in practice descriptions in the form of white papers,
playbook generation, and implementation demonstrations, which aim to improve
the ability and efficiency of organizations.
The public comment period is open through May 12, 2021. See the publication
details for a copy of the draft and instructions for submitting
comments. You can also help shape and contribute to this project. Join the
Community of Interest by sending an email to applied-crypto-visibility@nist.gov.
Title: International
Women’s Day: How to support and grow women in cybersecurity
CISA
Strongly Urges All Organizations to Immediately Address Microsoft Exchange
Vulnerabilities
03/08/2021 07:31 PM EST
Original
release date: March 8, 2021
CISA has published a Remediating
Microsoft Exchange Vulnerabilities web page that strongly urges all
organizations to immediately address the recent Microsoft Exchange Server
product vulnerabilities. As exploitation of these vulnerabilities is widespread
and indiscriminate, CISA strongly advises organizations follow the guidance
laid out in the web page. The guidance provides specific steps for both leaders
and IT security staff and is applicable for all sizes of organizations across
all sectors.
Title: MCAS Data Protection
Blog Series: MCAS DLP Walk-Through
Original
release date: February 9, 2021
Apple has released security updates to address vulnerabilities in macOS Big
Sur 11.2, macOS Catalina 10.15.7, and macOS Mojave 10.14.6. An attacker could
exploit these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Apple security
update and apply the necessary updates.
This product is provided subject to this Notification
and this Privacy
& Use policy.
Title:
Multiple Security Updates Affecting TCP/IP: CVE-2021-24074, CVE-2021-24094,
and CVE-2021-24086
URL: https://msrc-blog.microsoft.com/2021/02/09/multiple-security-updates-affecting-tcp-ip/
Published On (YYYY-dd-MM):2021-09-02
Overview:
Today Microsoft released a set of fixes affecting Windows TCP/IP
implementation that include two Critical Remote Code Execution
(RCE) vulnerabilities (CVE-2021-24074, CVE-2021-24094) and
an Important Denial of Service
(DoS) vulnerability (CVE-2021-24086). The two RCE vulnerabilities are
complex which make it difficult to
create functional exploits, so they are not
likely in the short term. We believe attackers will be able to create
DoS exploits much more quickly and expect all three issues might
be exploited with a DoS attack shortly after
release. Thus, we recommend customers move …
|
Azure AD B2C Virtual Please join us for Azure AD B2C – Join Session 1 – February 19th – This session focuses on Session 2 – March 12th – How Learn how to create your Azure
Session 3 – April 9th- Get started with Azure Learn how to set up the Azure AD B2C policy and relying party
Session 4 – May 14th- Extend Learn how to extend B2C Scenario:
We |
Original
release date: February 9, 2021
Microsoft has released a security advisory to address an escalation of
privileges vulnerability, CVE-2021-1732,
in Microsoft Win32k. A local attacker can exploit this vulnerability to take
control of an affected system. This vulnerability was detected in exploits in
the wild.
CISA encourages users and administrators to review Microsoft Advisory for
CVE-2021-1732 and apply the necessary patch to Windows 10 and Windows 2019
servers.
This product is provided subject to this Notification
and this Privacy
& Use policy.
|