Invitation: Mission Autonomy Hackathon at Vanderbilt (Oct 6–10, 2025)

Invitation: Mission Autonomy Hackathon at Vanderbilt (Oct 6–10, 2025)

Amazon Web Services (AWS) and Vanderbilt University invite your students to participate in the Mission Autonomy Hackathon, an immersive five-day event advancing innovation in autonomous systems. The hackathon will be held October 6–10, 2025, with sessions at Vanderbilt University in Nashville, TN.

Submitted by Regan Williams on

12th Annual Best Scientific Cybersecurity Paper Competition Winners

12th Annual Best Scientific Cybersecurity Paper Competition Winners

The National Security Agency (NSA) has awarded the 12th Annual Best Scientific Cybersecurity Paper Competition to “Decoding Trust: Comprehensive Assessment of Trustworthiness in GPT Models.” The winning paper, authored by 19 researchers including Professors Dawn Song (UC Berkeley), Bo Li (UIUC), and Sanmi Koyejo (Stanford), proposes a groundbreaking evaluation framework for assessing the trustworthiness of large language models (LLMs) such as GPTs.

Submitted by Regan Williams on

NSA 2023 Cybersecurity Year in Review

NSA 2023 Cybersecurity Year in Review

The National Security Agency has published their 2023 Cybersecurity Year in Review!

In an effort to be more transparent, the National Security Agency publishes an annual year in review sharing information regarding cybersecurity efforts that better equipped U.S. defenses against high priority cyber threats. NSA’s efforts to help secure the nation’s most sensitive systems also help your cybersecurity because NSA cascades these solutions through public guidance and engages with key technology providers to help them bolster the security of their products and services.

Submitted by Regan Williams on

CISA urges mobile security

CISA urges mobile security

According to a message from CISA on Monday, November 24th 2025, Messaging apps are being targeted by malicious spyware actors using commercial spyware programs.

Several threat actors have used “sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim’s messaging app,” which then lets them deploy additional malware and acquire deeper access to the target’s phone, CISA said in an alert.

Submitted by Regan Williams on

NSA Releases Guidance on Mitigating Malicious Activity from Bulletproof Hosting Provider Infrastructure

NSA Releases Guidance on Mitigating Malicious Activity from Bulletproof Hosting Provider Infrastructure

The National Security Agency (NSA) is joining the Cybersecurity and Infrastructure Security Agency (CISA) and others to release the Cybersecurity Information Sheet (CSI), “Bulletproof Defense: Mitigating Risks from Bulletproof Hosting Providers,” to provide internet service providers (ISPs) and network defenders recommendations to mitigate potential cybercriminal activity enabled by bulletproof hosting (BPH) providers.

Submitted by Regan Williams on

Call for Papers: MDE4SA ’26 Workshop

Call for Papers: MDE4SA ’26 Workshop

CALL FOR PAPERS - MDE4SA ’26 Workshop
5th edition of the Model–Driven Engineering for Software Architecture (MDE4SA '26) workshop
Location: Amsterdam, Netherlands (co-located with ICSA 2026)
Dates: June 22 – June 26, 2026 (exact workshop dates to be decided)
Workshop website: https://mde4sa.github.io/ 

Submitted by Regan Williams on
Subscribe to