NSA

NSA releases guidance for securing Unified Communications and VVoIP

The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last…

3 years ago

Former NSA contractor Reality Winner who leaked gov report will be released on November

Reality Winner, a former NSA contractor who leaked classified documents to the press in 2017, has been released from prison…

3 years ago

Denmark intel helped US NSA to spy on European politicians

Denmark’s foreign secret service allowed the US NSA to spy on European politicians through a Danish telecommunications hub. Journalists from Danish…

3 years ago

Microsoft fixes 2 critical Exchange Server flaws reported by the NSA

Microsoft patch Tuesday security updates address four high and critical vulnerabilities in Microsoft Exchange Server that were reported by the…

3 years ago

Two former NSA Officials appointed by Joe Biden for prominent cyber roles

President Joe Biden has appointed two former senior NSA officials for two prominent cyber roles in his administration. President Joe…

3 years ago

NSA embraces the Zero Trust Security Model

The National Security Agency (NSA) published a document to explain the advantages of implementing a zero-trust model. The National Security…

3 years ago

NSA Equation Group tool was used by Chinese hackers years before it was leaked online

The Chinese APT group had access to an NSA Equation Group, NSA hacking tool and used it years before it…

3 years ago

Rob Joyce is the new NSA Cyber Director

The U.S. National Security Agency has appointed Rob Joyce as the agency’s new director of cybersecurity, who has long experience…

3 years ago

FBI, CISA, ODNI and NSA blames Russia for SolarWinds hack

A joint statement issued by US security agencies confirmed that Russia was likely the origin of the SolarWinds supply chain…

3 years ago

NSA warns of cloud attacks on authentication mechanisms

The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks…

3 years ago

This website uses cookies.