Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware Threat intelligence | Microsoft Security Blog
New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects Threat intelligence | Microsoft Security Blog
Malvertising campaign leads to info stealers hosted on GitHub Threat intelligence | Microsoft Security Blog
Privacy-Preserving Federated Learning – Future Collaboration and Continued Research NIST | Cybersecurity Insights
NIST’s International Cybersecurity and Privacy Engagement Update – New Translations NIST | Cybersecurity Insights
NIST Finalizes Guidelines for Evaluating ‘Differential Privacy’ Guarantees to De-Identify Data NIST | News
Red Siege at Wild West Hackin’ Fest Mile High 2025 – What to Expect! Blog – Red Siege Information Security
Bug Bounty Radar // The latest bug bounty programs for March 2023 The Daily Swig | Cybersecurity news and views
Indian transport ministry flaws potentially allowed creation of counterfeit driving licenses The Daily Swig | Cybersecurity news and views
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits Threat Analysis Group (TAG)