Published on: 2025-04-23 03:43:00
Why it matters: Articles on this site that cover software vulnerabilities typically include CVE codes, which tech companies worldwide use to identify cybersecurity threats. Funding for the program that manages the CVE database nearly expired this week, potentially endangering global cybersecurity coordination efforts. Although the crisis was averted at the last minute, the cybersecurity community has begun taking steps to avoid a repeat. The US Department of Homeland Security has extended fundi
Keywords: cve cybersecurity efforts funding program
Find related items on AmazonPublished on: 2025-04-23 09:16:35
FOR IMMEDIATE RELEASE April 16, 2025 CVE Foundation Launched to Secure the Future of the CVE Program [Bremerton, Washington] – The CVE Foundation has been formally established to ensure the long-term viability, stability, and independence of the Common Vulnerabilities and Exposures (CVE) Program, a critical pillar of the global cybersecurity infrastructure for 25 years. Since its inception, the CVE Program has operated as a U.S. government-funded initiative, with oversight and management pro
Keywords: cve cybersecurity foundation global program
Find related items on AmazonPublished on: 2025-04-24 03:27:03
The US government has continued to make drastic cuts to budgets and personnel, but one cybersecurity service has at least temporarily avoided the chop. The Common Vulnerabilities and Exposures database operated by nonprofit MITRE Corp will receive 11 months of federal support. A representative from the Cybersecurity and Infrastructure Security Agency, whose parent agency funds the MITRE database, told Reuters that the department exercised an "option period on the contract to ensure there will be
Keywords: agency cybersecurity database federal mitre
Find related items on AmazonPublished on: 2025-04-24 19:36:58
The Common Vulnerability and Exposures, or CVE, repository holds the answers to some of information security's most vital questions. Namely, which security issue are we talking about, exactly, and how does it work? The 25-year-old CVE program, an essential part of global cybersecurity, is cited in nearly any discussion or response to a computer security issue, including Ars posts. CVE was at real risk of closure after its contract was set to expire on April 16. The nonprofit MITRE runs CVE and
Keywords: cisa cve cybersecurity global security
Find related items on AmazonPublished on: 2025-04-25 11:16:35
FOR IMMEDIATE RELEASE April 16, 2025 CVE Foundation Launched to Secure the Future of the CVE Program [Bremerton, Washington] – The CVE Foundation has been formally established to ensure the long-term viability, stability, and independence of the Common Vulnerabilities and Exposures (CVE) Program, a critical pillar of the global cybersecurity infrastructure for 25 years. Since its inception, the CVE Program has operated as a U.S. government-funded initiative, with oversight and management pro
Keywords: cve cybersecurity foundation global program
Find related items on AmazonPublished on: 2025-04-26 11:41:52
is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. Funding is about to run out for the Common Vulnerabilities and Exposures (CVE) program – a system used by major companies like Microsoft, Google, Apple, Intel, and AMD to identify and track publicly disclosed cybersecurity vulnerabilities. The program helps engineers identify how bad an exploit is and how to prioritize applying patches or other miti
Keywords: cve cybersecurity mitre program vulnerabilities
Find related items on AmazonPublished on: 2025-04-28 19:00:24
It’s only been a few months since RFK Jr. took office as head of the Department of Health and Human Services but, unless something changes drastically, he is shaping up to be one of the worst health leaders in the history of the agency. Under Kennedy’s watch, the HHS has fired thousands of staff, including researchers and scientists from the CDC, the FDA, and other key health and science agencies that do critical research and protect Americans’ health. At the same time, massive funding cuts hav
Keywords: cybersecurity data health hhs staff
Find related items on AmazonPublished on: 2025-05-06 03:25:53
Democratic Sen. Ron Wyden has put a hold on the Trump administration’s nomination of Sean Plankey to head the federal government’s top cybersecurity agency, citing a “multi-year cover up” of security flaws at U.S. telecommunication companies. Wyden said in remarks, seen by TechCrunch and confirmed by the senator’s spokesperson, that he will block the nomination of Plankey to serve as director of the Cybersecurity and Infrastructure Security Agency (CISA) until the agency agrees to release a 202
Keywords: companies cybersecurity report said wyden
Find related items on AmazonPublished on: 2025-05-12 07:35:49
Today, we’re announcing Sec-Gemini v1, a new experimental AI model focused on advancing cybersecurity AI frontiers. As outlined a year ago, defenders face the daunting task of securing against all cyber threats, while attackers need to successfully find and exploit only a single vulnerability. This fundamental asymmetry has made securing systems extremely difficult, time consuming and error prone. AI-powered cybersecurity workflows have the potential to help shift the balance back to th
Keywords: cybersecurity gemini sec threat v1
Find related items on AmazonPublished on: 2025-06-03 07:00:01
Assaf Rappaport, Wiz, on Centre Stage during day one of Web Summit 2021 at the Altice Arena in Lisbon, Portugal. Google's acquisition of cybersecurity startup Wiz could be a turning point for an uncertain IPO market and a mergers and acquisitions environment aching from a slowdown in deal activity. Alphabet announced Tuesday that it plans to buy the Israeli cybersecurity startup for $32 billion in its biggest acquisition ever. The deal came months after an initial $23 billion offer fell throug
Keywords: companies cybersecurity ipo said wiz
Find related items on AmazonPublished on: 2025-06-11 06:00:40
Google announced today a definitive agreement to acquire leading cloud security platform Wiz for $32 billion in an all-cash transaction. Wiz was founded in 2020 and has become one of the largest cybersecurity firms focusing on securing cloud services. The company offers an online cybersecurity platform that connects to different cloud providers, enabling organizations to detect and mitigate security risks across various environments from a single dashboard. Wiz says its products will continue
Keywords: cloud cybersecurity google security wiz
Find related items on AmazonPublished on: 2025-06-18 10:51:04
Women in cybersecurity aren’t just battling digital threats—they’re also fighting outdated workplace norms, implicit biases, and the constant expectation of balancing leadership with caregiving. The cybersecurity industry remains male-dominated, and despite progress, many female professionals still find themselves burdened with additional challenges their male counterparts rarely face. Cybersecurity expert and author Jane Frankland put it bluntly in a recent conversation on the Thales Security
Keywords: change cybersecurity leadership women workplace
Find related items on AmazonPublished on: 2025-06-22 07:37:31
In Brief President Donald Trump nominated Sean Plankey to head the Cybersecurity and Infrastructure Security Agency (CISA), according to a White House email sent to journalists on Tuesday. Plankey has several years of experience working for the U.S. government. In 2013, Plankey gave cybersecurity support to U.S. forces deployed in Afghanistan, then worked at U.S. Cyber Command, the U.S. Coast Guard, and the U.S. Navy. He also worked in the previous Trump administration as a director for cyber
Keywords: cisa cyber cybersecurity plankey trump
Find related items on AmazonPublished on: 2025-06-25 02:47:26
Switzerland's National Cybersecurity Centre (NCSC) has announced a new reporting obligation for critical infrastructure organizations in the country, requiring them to report cyberattacks to the agency within 24 hours of their discovery. According to the NCSC announcement, this new requirement is introduced as a response to the increasing number of cybersecurity incidents and their impact on the country. Examples of types of cyberattacks that will have to be reported include: Cyberattacks tha
Keywords: cyberattacks cybersecurity ncsc new report
Find related items on AmazonPublished on: 2025-07-07 08:16:00
A hot potato: Even before the invasion of Ukraine, the US had long considered Russia its main cybersecurity threat. But it appears that the designation no longer applies. The move comes as Trump attempts to normalize the relationship with Russia and President Putin, and follows a heated exchange with Ukrainian President Volodymyr Zelenskyy at the White House. According to a US official familiar with the matter (via The Record), new Defense Secretary Pete Hegseth has ordered US Cyber Command to
Keywords: agency china cybersecurity russia said
Find related items on AmazonPublished on: 2025-07-07 23:05:00
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Direct attacks on critical infrastructure get a lot of attention, but the bigger danger often lies in something less visible: The poor cybersecurity practices of the businesses that keep these systems running. According to the Cybernews Business Digital Index, a staggering 84% earned a “D” grade or worse for their cybersecurity practices, with 43% falling into the “F” c
Keywords: ai businesses companies cybersecurity security
Find related items on AmazonPublished on: 2025-07-15 00:00:00
Despite employers requiring their employees to complete yearly cybersecurity training courses, human-driven cybersecurity breaches still happen. The problem could even get substantially worse as generative AI increases the scale and personalization of social engineering campaigns. Anagram, formerly known as Cipher, is taking a new approach to employee cybersecurity training that the company hopes can keep up with the changing nature of these campaigns. The New York-based company built a platfo
Keywords: anagram cybersecurity said sugarman training
Find related items on AmazonPublished on: 2025-07-12 02:58:10
When the so-called Department of Government Efficiency recently fired dozens of people from the US Digital Service—the agency DOGE subsumed last month—it may not have realized the extent of the collateral damage. The USDS doesn't operate in a vacuum; part of its longtime mandate is to consult with federal agencies to help improve their digital platforms and websites. So when DOGE terminated Jonathan Kamens in its agency purge, it may not have fully grasped that it was firing the security lead f
Keywords: cybersecurity gov kamens va veterans
Find related items on AmazonPublished on: 2025-07-12 01:47:21
Health Net Federal Services (HNFS) and its parent company, Centene Corporation, have agreed to pay $11,253,400 to settle allegations that HNFS falsely certified compliance with cybersecurity requirements under its Defense Health Agency (DHA) TRICARE contract. The U.S. government contracted HNFS to provide managed healthcare support services for TRICARE's North region, covering 22 states. The contract required compliance with cybersecurity standards, specifically 48 C.F.R. § 252.204-7012 and 51
Keywords: allegations compliance cybersecurity health hnfs
Find related items on AmazonPublished on: 2025-07-12 03:28:54
Researchers at the AI security company Adversa AI have found that Grok 3, the latest model released by Elon Musk's startup xAI this week, is a cybersecurity disaster waiting to happen. The team found that the model is extremely vulnerable to "simple jailbreaks," which could be used by bad actors to "reveal how to seduce kids, dispose of bodies, extract DMT, and, of course, build a bomb," according to Adversa CEO and cofounder Alex Polyakov. And it only gets worse from there. "It’s not just ja
Keywords: ai cybersecurity grok model polyakov
Find related items on AmazonGo K’awiil is a project by nerdhub.co that curates technology news from a variety of trusted sources. We built this site because, although news aggregation is incredibly useful, many platforms are cluttered with intrusive ads and heavy JavaScript that can make mobile browsing a hassle. By hand-selecting our favorite tech news outlets, we’ve created a cleaner, more mobile-friendly experience.
Your privacy is important to us. Go K’awiil does not use analytics tools such as Facebook Pixel or Google Analytics. The only tracking occurs through affiliate links to amazon.com, which are tagged with our Amazon affiliate code, helping us earn a small commission.
We are not currently offering ad space. However, if you’re interested in advertising with us, please get in touch at [email protected] and we’ll be happy to review your submission.