Welcome
Hello and Welcome!
Be sure to attend our monthly meetings. Lots of good information there. Register for our Thursday May28th Virtual Meeting on our site ISC2CT.ORG
Also come Join our (ISC)2 Connecticut Chapter Discord Server
Upcoming Training:
NII CWASP- Certified Web application Security Professional | May 12-14 | Regular Participant - USD $199 ISACA/ISC2 Member - USD $159 Returning Participant/Clients - USD $129 The CWASP training is designed to provide professionals a hands-on experience of implementing security measure for safeguarding web applications through case studies and examples. The CWASP training is a 12 hours of online training spread across 3 days 4 hours each day and the workshop module is for 12 hours which includes 11 hours of training sessions followed by 1-hour online examination.Registration
NII ISO 27701 Lead Implementor Training May 18-22 | Regular Participant - USD $799 ISACA/ISC2 Member/Clients -USD $699 Understand how ISO/IEC 27701 can extend your ISO/IEC 27001 information security management system (ISMS) to include requirements for protecting personally identifiable information (PII) and provide a framework for a privacy information management system (PIMS).Registration
Quinnipiac University is committed to helping advance the field of cybersecurity through its School of Computing & Engineering. To support the growth of professionals within cybersecurity and computing, Quinnipiac offers flexible online and on-campus opportunities that deliver practical skills you can immediately apply on the job. Both its MS in Cybersecurity and MS in Computer Science programs feature hands-on experience in lab settings that simulate real-world scenarios. To learn more about these exciting opportunities, Visit Quinnipiac University
Cyber News
Copy Fail: root on virtually any Linux
CVE-2026-31431 impacts Linux kernels compiled between 2017–2026. Affected: Ubuntu, RHEL, SUSE, Debian, Amazon Linux, and others.
Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks
New AI model drives Project Glasswing, a effort to secure critical software before advanced capabilities fall into the wrong hands.
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions.
Recently leaked Windows zero-days now exploited in attacks
Since the start of the month, a security researcher known as "Chaotic Eclipse" or "Nightmare-Eclipse" has published proof-of-concept exploit code for all three security issues in protest to how Microsoft's Security Response Center (MSRC) handled the disclosure process.
WordPress plugin suite hacked to push malware to thousands of sites
More than 30 WordPress plugins in the EssentialPlugin package have been compromised with malicious code that allows unauthorized access to websites running them.
Ransomware Negotiator Secretly Worked Both Sides—then Joined the Conspiracy
A former cyber incident responder pleaded guilty to secretly feeding client negotiation data to BlackCat ransomware operators—the ultimate insider threat.
OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years
An OpenSSH vulnerability introduced 15 years ago could allow attackers to obtain full root shell access to vulnerable servers.