Learn about working in the public sector as an engineer in this episode of Diverse: a SWE podcast! Source Views: 3
Year: 2025
Results from SWE’s FY23 Member Focused Culture Study & Annual Member Survey
The Society of Women Engineers (SWE) Board of Directors initiated a culture study on the recommendation of the McKinley Advisors consulting group, who conducted an all-member...
SWE Sends Out Membership Milestone Pins for those Celebrating Milestones in FY24 (7/1/2023 – 6/30/2024)
As a SWE member, engineers and technologists from all walks of life join in a legacy that is over 70 years in the making. Each July,...
Celebrate Award-Winning Engineer Dr. Kerianne Hobbs
Learn about the achievements of Dr. Kerianne Hobbs who recently earned the 40 Under Forty Award from the International Armed Forces Communications and Electronics Association (AFCEA). Source...
2023 WE Local Collegiate Competition Achievements
Congratulations to the recipients of the 2023 WE Local Collegiate Competition awards! Learn more about their research projects in this article. Source Views: 1
CVE Program Almost Unfunded – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Mitre’s CVE’s program—which provides common naming and other informational resources about cybersecurity vulnerabilities—was about to be cancelled, as the US...
MITRE CVE Program Uncertainty: Mend.io’s commitment to uninterrupted vulnerability protection – Source: securityboulevard.com
Source: securityboulevard.com – Author: Mend.io Communications As many of you may know, MITRE’s DHS contract to manage the CVE and CWE programs expired on April 16,...
Whistleblower: Musk’s DOGE Stole Data, Caused Breach at U.S. Agency – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt A cybersecurity specialist with the U.S. National Labor Relations Board is saying that technologist with Elon Musk’s cost-cutting DOGE group...
AI Workshop: Fully Automate Tier 1/2 SOC Tasks…At Scale – Source: securityboulevard.com
Source: securityboulevard.com – Author: Shriram Sharma Security Operations Centers (SOCs) are under siege. The sheer volume of alerts generated by security tools is staggering, often reaching...
Vector and Embedding Weaknesses in AI Systems – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bar-El Tayouri Introduction AI security threats are evolving at roughly the same speed that AI itself is: extremely fast. One of the...
Frequently Asked Questions About the MITRE CVE Program Expiration and Renewal – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tenable Security Response Team Concerns about the future of the MITRE CVE Program continue to circulate. The Tenable Security Response Team has...
BSidesLV24 – Common Ground – 101 Things Your Application is Doing Without Your Knowledge – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » BSidesLV24 – Common Ground – 101 Things Your Application is Doing Without Your Knowledge...
Randall Munroe’s XKCD ‘Anachronym Challenge’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Thursday, April 17, 2025 Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News...
What’s happening with MITRE and the CVE program uncertainty – Source: securityboulevard.com
Source: securityboulevard.com – Author: Brian Fox Yesterday’s headlines have sent ripples through the cybersecurity and software supply chain communities: MITRE announced that U.S. government funding for...
Why the 2025 PyPI Attack Signals a New Era in Cloud Risk – Source: securityboulevard.com
Source: securityboulevard.com – Author: MixMode Threat Research MixMode Threat Research MixMode Threat Research is a dedicated contributor to MixMode.ai’s blog, offering insights into the latest advancements and...
CVE Program Almost Unfunded – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bruce Schneier Mitre’s CVE’s program—which provides common naming and other informational resources about cybersecurity vulnerabilities—was about to be cancelled, as the US...
Developers Beware: Slopsquatting & Vibe Coding Can Increase Risk of AI-Powered Attacks – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Aminu Abdullahi Security researchers and developers are raising alarms over “slopsquatting,” a new form of supply chain attack that leverages AI-generated misinformation...
LastPass Review: Is it Still Safe and Reliable in 2025? – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: TechRepublic Staff LastPass fast facts Our rating: 3.4 stars out of 5. Pricing: Starts at $3 per month. Key features: Extensive multi-factor...
Smashing Security podcast #413: Hacking the hackers… with a credit card? – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content A cybersecurity firm is buying access to underground crime forums to gather intelligence. Does that seem daft...
Insurance firm Lemonade warns of breach of thousands of driving license numbers – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley A data breach at insurance firm Lemonade left the details of thousands of drivers’ licenses exposed for 17 months. According...
Multiple Groups Exploit NTLM Flaw in Microsoft Windows – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
China-Linked Hackers Lay Brickstorm Backdoors on Euro Networks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Rob Wright, Senior News Director, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why...
Ransomware gang ‘CrazyHunter’ Targets Critical Taiwanese Orgs – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why...
Patch Now: NVDIA Flaws Expose AI Models, Critical Infrastructure – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Cloud, Cryptography Flaws in Mobile Apps Leak Enterprise Data – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Active Directory Recovery Can’t Be an Afterthought – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dan Conrad Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Accounting Firms Can’t Skimp on Cybersecurity – Source: www.darkreading.com
Source: www.darkreading.com – Author: Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is...
Funding Expires for Key Cyber Vulnerability Database – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is...
Hertz Data Breach Exposes Customer Information in Cleo Zero-Day Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Hertz Corporation has confirmed a data breach that exposed sensitive customer data after attackers exploited a zero-day vulnerability in file transfer software...
China-Backed Hackers Exploit BRICKSTORM Backdoor to Spy on European Businesses – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A Chinese cyber espionage tool initially made for intrusion into Linux systems has been used to spy on European organizations via Windows....





















