#NIST

BGDon 🇨🇦 🇺🇸 👨‍💻BrentD@techhub.social
2026-02-02

It is a matter of time before Quantum Computing gains the ability to crack today’s core public key encryption methods.

Our latest post on TechAptitude outlines the efforts by NIST to generate new cryptography standards to help withstand future quantum powered cyber attacks. Check it out!

techaptitude.substack.com/p/qu #Cryptography #Quantum #QuantumTechnology #QuantumComputing #NIST #FIPS #CodeBreaker #Encryption #QDay #PQC #PostQuantumCryptography #Passwords #Ciphers #Algorithm #TechAptitude

TechAptitude NIST FIPS Standards
2026-01-30

eShard is proud to join the SPARTAQUS project with under the German government "SCA4PQC" program.

Over the next 4 years, we’ll push state of the art tooling and PQC security testing expertise to evaluate real world implementations for side-channel leakage.

#PQC #NIST

CosicBeCosicBe
2026-01-29

📢 COSIC researchers have contributed to multiple preview submissions for upcoming responses to the Call for Multi-Party Threshold Schemes (1st round previews, Jan 2026).
csrc.nist.gov/Projects/thresho

COSIC contributions include previews of:
- PiVer: Π Verifiable Secret Sharing Framework
- PQarrots: Macaw, Kea and Kakapo (Threshold primitives from (isogeny-based) group actions)
- Haystack: Threshold and Distributed Stateful Hash-Based Signatures
See csrc.nist.gov/Projects/thresho

Rod2ik 🇪🇺 🇨🇵 🇪🇸 🇺🇦 🇨🇦 🇩🇰 🇬🇱☮🕊️rod2ik
2026-01-23

La bonne nouvelle : les solutions existent déjà. En 2024, le ( of and ) a finalisé ses trois premières normes - ( ) : - pour encapsulation de clés, - et - pour les .

Rod2ik 🇪🇺 🇨🇵 🇪🇸 🇺🇦 🇨🇦 🇩🇰 🇬🇱 ☮🕊️rod2ik.bsky.social@bsky.brid.gy
2026-01-23

La bonne nouvelle : les solutions existent déjà. En 2024, le #NIST ( #National #Institute of #Standards and #Technology) a finalisé ses trois premières normes #post- #quantiques ( #PQC) : #ML-KEM pour encapsulation de clés, #ML-DSA et #SLH-DSA pour les #signatures.

NIST SSDF 1.2 shifts focus from "write secure code" to "operate secure software" across the full SDLC—recognizing AppSec as a journey, not a destination.
jpmellojr.blogspot.com/2026/01
#NIST #SSDF #AppSec #DevSecOps

2026-01-22

Explains a LOT.

You see: Stormtroopers had an Imperial upbringing and training; their uniforms were made in the outer rims of the Empire - regions that used Metric (rebel scum); their sights, electronics, ranging, etc were calibrated to Metric. Hence the bad shots they were.

#StarWars #Stormtrooper #NIST #Metric #Imperial

2026-01-22

It's been a busy 24 hours in the cyber world with critical zero-days, active exploitation of known flaws, nation-state activity, and important updates on regulatory enforcement and government cyber agencies. Let's dive in:

Energy Sector Phishing & Ransomware Leader Guilty 🚨

- Microsoft has detailed a multi-stage phishing and Business Email Compromise (BEC) campaign targeting energy sector organisations. Attackers used compromised Microsoft accounts, SharePoint URLs, and credential harvesting to take over inboxes and send hundreds of phishing emails to internal and external contacts.
- Attackers set inbox rules to delete incoming emails and out-of-office replies, and even responded to queries about the legitimacy of the phish, demonstrating sophisticated social engineering.
- In other news, Russian national Ianis Antropenko pleaded guilty to leading a ransomware conspiracy (Zeppelin, GlobeImposter) that targeted at least 50 victims over four years, causing $1.5 million in losses. Authorities seized over $3.4 million in cryptocurrency and cash from him.

🕵🏼 The Register | go.theregister.com/feed/www.th
🤫 CyberScoop | cyberscoop.com/ianis-antropenk

DPRK Abuses VS Code Tunnels, Malicious PyPI Package Spreads Miner 🌑

- North Korean actors are deploying spear-phishing campaigns that abuse Microsoft VS Code's built-in tunneling feature to gain full remote control of targeted systems. This technique allows attackers to bypass traditional C2 infrastructure and custom malware, blending in with legitimate developer activity.
- The attacks, primarily targeting South Korean entities, use JSE files disguised as HWPX documents to install VS Code and establish a tunnel, giving attackers interactive access to the VS Code terminal and file browser via trusted Microsoft infrastructure.
- Separately, a malicious PyPI package named `sympy-dev` has been found impersonating the legitimate `SymPy` library to deploy an XMRig cryptocurrency miner on Linux hosts. The malware is designed to trigger only when specific polynomial routines are called and uses memory-backed file descriptors to reduce on-disk artifacts.

🌑 Dark Reading | darkreading.com/endpoint-secur
🚨 The Hacker News | thehackernews.com/2026/01/mali

Cisco Zero-Day Under Active Exploitation ⚠️

- Cisco has released emergency patches for a critical zero-day vulnerability, CVE-2026-20045 (CVSS 8.2), affecting multiple Unified Communications products and Webex Calling Dedicated Instance.
- The flaw allows unauthenticated remote attackers to execute arbitrary commands on the underlying operating system and escalate privileges to root via crafted HTTP requests to the web-based management interface.
- CISA has added CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies apply fixes by February 11, 2026. No workarounds are available, so immediate patching is crucial.

🚨 The Hacker News | thehackernews.com/2026/01/cisc
🕵🏼 The Register | go.theregister.com/feed/www.th

FortiGate SSO Bypass Exploited, SmarterMail Auth Bypass Also Hit 🛡️

- Arctic Wolf has warned of automated malicious activity targeting Fortinet FortiGate devices, involving unauthorised firewall configuration changes via compromised SSO accounts. Attackers are creating persistence accounts, modifying VPN/firewall rules, and exfiltrating configuration files.
- This activity aligns with exploitation of CVE-2025-59718 and CVE-2025-59719, SSO authentication bypasses patched in December 2025. However, some administrators report exploitation on fully patched FortiOS 7.4.10, suggesting a patch bypass, with Fortinet reportedly preparing further fixes.
- In other news, a critical authentication bypass (WT-2026-0001) in SmarterTools SmarterMail email software was actively exploited just two days after a patch release. The flaw allows unauthenticated users to reset the system administrator password and then achieve Remote Code Execution (RCE) via a built-in volume mount command feature.

🚨 The Hacker News | thehackernews.com/2026/01/auto
🕵🏼 The Register | go.theregister.com/feed/www.th
🚨 The Hacker News | thehackernews.com/2026/01/smar

Ancient Telnet Bug Hands Out Root Access 👴

- A critical, 11-year-old vulnerability (CVE-2026-24061, CVSS 9.8) in the GNU InetUtils telnet daemon (`telnetd`) has been disclosed and is being actively exploited.
- The bug allows attackers to trivially gain root access by sending a crafted `USER` environment variable (`-f root`) during connection, bypassing normal authentication.
- Experts strongly recommend decommissioning `telnetd` entirely due to its unencrypted nature, or at minimum, patching immediately and restricting network access to the telnet port to trusted clients only.

🕵🏼 The Register | go.theregister.com/feed/www.th

AI Agents Pose New Insider Threat, Financial Sector Still Lags on Basics, New CVE System Launched 🧠

- A Davos panel highlighted AI agents as a potential "ultimate insider threat," posing new security challenges as they can access sensitive data and perform harmful tasks. Recommendations include implementing zero trust, least-privilege access, and "guard agents" to monitor AI behaviour.
- The UK's 2025 CBEST report revealed that financial organisations continue to miss basic cybersecurity safeguards, with common weaknesses including poor access controls, misconfigured/unpatched systems, and ineffective detection. Social engineering remains a significant threat due to poor staff culture and awareness.
- The Computer Incident Response Center Luxembourg (CIRCL) has launched the Global CVE Allocation System (GCVE), a decentralised alternative to MITRE's CVE program. GCVE allows independent numbering authorities to assign vulnerability identifiers, aiming to address concerns about CVE's governance and sustainability.

🕵🏼 The Register | go.theregister.com/feed/www.th
🕵🏼 The Register | go.theregister.com/feed/www.th
🤫 CyberScoop | cyberscoop.com/gcve-vulnerabil

Cellebrite Misused by Jordan, Spain Closes Pegasus Probe ⚖️

- Citizen Lab reported that Jordanian authorities used Cellebrite digital forensic software to extract data from phones of at least seven activists critical of the Gaza war, often during interrogations or detentions. This highlights the ongoing misuse of surveillance technology against civil society.
- Separately, a Spanish judge closed a probe into the use of Pegasus spyware against top government officials due to a lack of cooperation from Israel, which regulates NSO Group's exports. The court found evidence of crimes that "jeopardised the security of the Spanish State."

🗞️ The Record | therecord.media/jordan-used-ce
🗞️ The Record | therecord.media/spanish-judge-

GDPR Fines Surge as Breach Notifications Hit Record High 📈

- DLA Piper's latest survey shows GDPR fines surpassed €1.2 billion in 2025, bringing the total since May 2018 to €7.1 billion. Daily data breach notifications surged 22% to an average of 443, the first time exceeding 400.
- Ireland remains the top enforcer, with a €530 million fine against TikTok being the largest in 2025. The report attributes the rise in breaches to geopolitics, cyber incidents, and new reporting regimes like NIS2 and DORA.

🕵🏼 The Register | go.theregister.com/feed/www.th

CISA and NIST Face Staffing Challenges 📉

- CISA's acting head, Madhu Gottumukkala, faced intense questioning from lawmakers over significant personnel reductions (nearly 1,000 staff lost since 2017) and reported attempts to fire the agency's CIO. Democrats expressed concern about weakened defences and reassignments, while Republicans suggested CISA was "doing more with less."
- NIST is also grappling with staff cuts (over 700 positions lost since 2025) and a shrinking budget, impacting its critical work on cybersecurity, AI, and post-quantum encryption. The Information Technology Laboratory (ITL) lost 89 employees, forcing a narrower focus and hindering efforts to reduce backlogs in its human-intensive cryptographic validation program.

🤫 CyberScoop | cyberscoop.com/cisa-madhu-gott
🤫 CyberScoop | cyberscoop.com/encryption-nist

#CyberSecurity #ThreatIntelligence #Vulnerability #ZeroDay #RCE #APT #Ransomware #Malware #DataPrivacy #GDPR #InfoSec #CISA #NIST #AI #SocialEngineering #FortiGate #Cisco #Telnet #CyberAttack

LabPlot (labplot.org)LabPlot@floss.social
2026-01-20

#LabPlot’s #NonlinearRegression routines reproduce #NIST certified results for datasets of varying complexity: :boost_love:

Why it matters:
👉 Unique validation: Direct comparison with #NIST #standards.
👉 Risk-safe: Open datasets.

How to fit a curve - a video tutorial:
👉 youtube.com/watch?v=gLDwTVl8XCA

Try it now:
1️⃣ Download #LabPlot: labplot.org/download.
2️⃣ File > Open Example > NIST Nonlinear Regression.

#OpenSource #Engineering #Physics #Chemistry #Science #Research #Data #Statistics #Math

2026-01-18

iX-Workshop IT-Sicherheit: Pentests methodisch planen, anfordern und analysieren

Schritt für Schritt zum sicheren System: Penetrationstests methodisch planen, beauftragen und auswerten, um Schwachstellen in der eigenen IT aufzuspüren.

heise.de/news/iX-Workshop-IT-S

#BSI #IT #ITInfrastruktur #iXWorkshops #NIST #PenetrationTesting #Test #news

2026-01-12

Det amerikanske 🇺🇸 #NIST National Institute of Standards and Technology vil modtage en betydelig finansierings-forøgelse, efter at administrationen sidste år planlagde at skære i instituttets budget

Instituttet vil modtage 1,8 milliarder dollar efter en ny bevillings-aftale i Kongressen
federalnewsnetwork.com/artific

2025-12-28

#LLRX #CyberSecurity @bespacific

Pete Recommends – Weekly highlights on cyber security issues, December 28, 2025

Five highlights from this week: Google will finally allow you to change your @gmail.com address; Those Epstein Redactions Weren't So Redacted; How Russia could attack Elon Musk's #Starlink satellites; Microsoft #Teams to let admins block external users via Defender portal; and #NIST warns of #NTP inaccuracy after blackouts across Colorado.

Posted in: Cybercrime, Cybersecurity, Email, Email Security, Legal Research, #Privacy, Search Engines, Technology Trends, United States Law

llrx.com/2025/12/pete-recommen

2025-12-28

Via #LLRX @psuPete Recommends – Weekly highlights on #cybersecurity issues, December 28, 2025 – Five highlights from this week: #Google will finally allow you to change your @gmail.com address; Those #Epstein #Redactions Weren’t So Redacted; How #Russia could attack #ElonMusk #Starlink #satellites; #MicrosoftTeams to let admins block external users via Defender portal; and #NIST warns of Network Time Protocol inaccuracy after #blackouts across #Colorado. llrx.com/2025/12/pete-recommen #privacy

AllAboutSecurityallaboutsecurity
2025-12-27

NIST aktualisiert Publikationsreihe zur Verbindung von Cybersecurity und Enterprise Risk Management

Die aktualisierten Veröffentlichungen ermöglichen Organisationen eine systematische Verknüpfung von Cybersecurity-Aktivitäten mit Enterprise Risk Management-Prozessen und wurden an das NIST Cybersecurity Framework 2.0 angepasst.

all-about-security.de/nist-akt

2025-12-25

Tom’s Hardware: NIST warns several of its Internet Time Service servers may be inaccurate due to a power outage — Boulder servers ‘no longer have an accurate time reference’ . “The National Institute of Standards and Technology has warned that several of its Internet Time Service servers could be providing inaccurate time following a failure of the primary atomic time scale, NIST-F4, at its […]

https://rbfirehose.com/2025/12/25/toms-hardware-nist-warns-several-of-its-internet-time-service-servers-may-be-inaccurate-due-to-a-power-outage-boulder-servers-no-longer-have-an-accurate-time-reference/
GlitchMentalMXGlitchMentalMX
2025-12-23

Estándares y seguridad: El NIST impulsa la IA en la manufactura. 🏗️ Una inversión clave para asegurar que la automatización industrial sea resiliente ante amenazas digitales. 🤖🛡️ glitchmental.com/2025/12/nist-

GripNewsGripNews
2025-12-22

🌗 美國國家標準與技術研究院(NIST)因斷電事件,時間訊號暫時偏移 5 微秒
➤ 當微秒級的精確成為一場危機:NIST 應對斷電危機的時序考驗
jeffgeerling.com/blog/2025/nis
美國國家標準與技術研究院(NIST)位於科羅拉多州博爾德的設施,因強風導致大規模停電,並在備用發電機故障後,主要時間訊號伺服器短暫偏離了國際協調時間(UTC)。儘管偏差僅為 5 微秒,但對高度依賴精確時間的科學研究及學術機構影響甚鉅。NIST 透過啟用其他設施的備援機制、應用電池備份及緊急電源,成功將時間偏差控制在極小範圍內,並維持伺服器線上運作,避免對廣大用戶造成影響。此次事件凸顯了時間基礎設施的脆弱性,並引發對過度依賴 GPS 的擔憂,促使各方尋求更多元的時間訊號備援方案。
+ 沒想到連時間訊號都會有這種意外!幸好 NIST 有備案,不然影響範圍一定很大。
+ 這也太驚險了吧!5 微秒聽起來不多,但對某

N-gated Hacker Newsngate
2025-12-22

🚨 Breaking news in the world of tiny time discrepancies: was 5 microseconds off, and the *almost* imploded. 🌌 But don't worry, your still works, and your cat still hates you. 😼
jeffgeerling.com/blog/2025/nis

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst