Tag: government
-
The Register: Biden signs sweeping cybersecurity order, just in time for Trump to gut it
Source URL: https://www.theregister.com/2025/01/17/biden_cybersecurity_eo/ Source: The Register Title: Biden signs sweeping cybersecurity order, just in time for Trump to gut it Feedly Summary: Ransomware, AI, secure software, digital IDs – there’s something for everyone in the presidential directive Analysis Joe Biden, in the final days of his US presidency, issued another cybersecurity order that is nearly…
-
The Register: Fortinet: FortiGate config leaks are genuine but misleading
Source URL: https://www.theregister.com/2025/01/17/fortinet_fortigate_config_leaks/ Source: The Register Title: Fortinet: FortiGate config leaks are genuine but misleading Feedly Summary: Competition hots up with Ivanti over who can have the worst start to a year Fortinet has confirmed that previous analyses of records leaked by the Belsen Group are indeed genuine FortiGate configs stolen during a zero-day raid…
-
The Register: Germany unleashes AMD-powered Hunter supercomputer
Source URL: https://www.theregister.com/2025/01/17/hlrs_supercomputer_hunter/ Source: The Register Title: Germany unleashes AMD-powered Hunter supercomputer Feedly Summary: €15 million system to serve as testbed for larger Herder supercomputer coming in 2027 Hundreds of AMD APUs fired up on Thursday as Germany’s High-Performance Computing Center (HLRS) at the University of Stuttgart announced the completion of its latest supercomputer dubbed…
-
Hacker News: Scaling to users requires Synapse Pro
Source URL: https://element.io/blog/scaling-to-millions-of-users-requires-synapse-pro/ Source: Hacker News Title: Scaling to users requires Synapse Pro Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the differences between Synapse Pro and the community version of Synapse for Matrix deployments, emphasizing Synapse Pro’s architecture tailored for high-scale applications. It outlines significant performance improvements through the use…
-
The Register: Medusa ransomware group claims attack on UK’s Gateshead Council
Source URL: https://www.theregister.com/2025/01/17/gateshead_council_cybersecurity_incident/ Source: The Register Title: Medusa ransomware group claims attack on UK’s Gateshead Council Feedly Summary: Pastes allegedly stolen documents on leak site with £600K demand Another year and yet another UK local authority has been pwned by a ransomware crew. This time it’s Gateshead Council in North East England at the hands…
-
The Register: Russia’s Star Blizzard phishing crew caught targeting WhatsApp accounts
Source URL: https://www.theregister.com/2025/01/16/russia_star_blizzard_whatsapp/ Source: The Register Title: Russia’s Star Blizzard phishing crew caught targeting WhatsApp accounts Feedly Summary: FSB cyberspies venture into a new app for espionage, Microsoft says Star Blizzard, a prolific phishing crew backed by the Russian Federal Security Service (FSB), conducted a new campaign aiming to compromise WhatsApp accounts and gain access…
-
Alerts: CISA and Partners Release Call to Action to Close the National Software Understanding Gap
Source URL: https://www.cisa.gov/news-events/alerts/2025/01/16/cisa-and-partners-release-call-action-close-national-software-understanding-gap Source: Alerts Title: CISA and Partners Release Call to Action to Close the National Software Understanding Gap Feedly Summary: Today, CISA—in partnership with the Defense Advanced Research Projects Agency (DARPA), the Office of the Under Secretary of Defense for Research and Engineering (OUSD R&E), and the National Security Agency (NSA)—published Closing the Software…
-
Alerts: CISA Adds One Known Exploited Vulnerability to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2025/01/16/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-50603 Aviatrix Controllers OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks…