NSA/CSS
@NSAGov
National Security Agency/Central Security Service official account, home to America's codemakers and codebreakers. Likes, retweets, and follows ≠ endorsement.
This #IndependenceDay, we celebrate the freedoms and democratic values penned in the opening paragraphs of the Declaration of Independence 249 years ago. Here at NSA, we’re dedicated to affirming those values with unwavering integrity in defense of our great nation.

We urge orgs to monitor for potential cyber threats against U.S. #CriticalInfrastructure —routine targets for Iranian govt-affiliated actors. See our joint fact sheet for more info & mitigations. 👉 go.dhs.gov/wjJ
Memory safety is one of many important aspects that contribute to holistic security. Software producers should utilize our new guidance to plan for and begin adoption of Memory Safe Languages today to reduce the risk of security incidents. 🔗: media.defense.gov/2025/Jun/23/20…
SIEM/SOAR platforms can empower network defenders to uncover cyber threats and protect your data from malicious actors. Cybersecurity executives and practitioners should review our new joint guidance to ensure proper implementation and security. nsa.gov/Press-Room/Pre…
From General Washington’s spies during the Revolutionary War, to our very first director, LT GEN Ralph Canine, and well into the future, Army intelligence has been a cornerstone of the nation’s lethality. Happy 250th birthday to @USArmy. This We’ll Defend. #Army250

The growing convergence of IT and OT systems has introduced new threats to OT environments. Our new report outlines improvements to security policies and requirements to improve the security of smart controllers embedded in OT National Security Systems. nsa.gov/Press-Room/Pre…
Congratulations to @GeorgiaTech for winning NSA’s 2024 Codebreaker Challenge! Thank you to all the schools and students who participated. Learn more about the challenge that helps prepare our nation’s future cyber warriors: nsa.gov/Press-Room/Pre…

Malicious cyber actors can conceal their activities and evade detection using fast flux, a technique that changes the IP address associated with a domain name. Follow our new guidance for strategies to detect and mitigate this national security threat. media.defense.gov/2025/Apr/02/20…
Honored to host @DNIGabbard for a tour of NSA/CSS Hawaii, where our talented workforce collaborates with partners across the Indo-Pacific region to deliver critical cybersecurity and foreign signals intelligence in defense of our Nation.
My first stop on my trip to the Indo-Pacific was in Honolulu where I visited NSA Hawaii where we talked about the importance of accurate, timely intelligence and upholding Americans Fourth Amendment rights. Mahalo to our NSA and INDOPACOM team for the warm welcome!
In accordance with Department of Defense Instruction 5400.17 and recent Executive Orders issued by the President, NSA is reviewing and adjusting its social media content to ensure compliance with DoD policies and priorities.

NSA is aware of posts that appear to show inappropriate discussions by IC personnel. IC collaboration platforms are intended to drive mission outcomes. Potential misuse of these platforms by a small group of individuals does not represent the community. Investigations to address…
#ICYMI, Ghidra 11.3 has new features to supercharge work on your cybersecurity challenges. We added the long-requested built-in Python3 support based on Pyhidra, a p-code accelerated emulator, and original source code to binary linking. Check it out: github.com/NationalSecuri…

Don’t miss an opportunity to learn from technical and language analysis experts at NSA over multiple semesters. Apply now for the Co-Op Program! bit.ly/2RitZ6H

Discover how NSA invests in its people through the National Cryptologic University. Watch the video to see how we’re building the future of expertise.
Failing to secure edge devices is like leaving a door open for malicious actors. Prevent exploitation of critical network components by following the mitigation strategies for edge devices in the reports published today by NSA and others. nsa.gov/Press-Room/Pre…
Thank you for your continued support of the National Cryptologic Museum. We are dedicated to presenting the public with historically accurate exhibits and we have corrected a mistake that covered an exhibit. We look forward to visitors exploring the museum and its rich history.
Here is the answer to the #NoSuchPuzzle. Did you get it right?

In honor of #NationalThesaurusDay 1/18, for each #NoSuchPuzzle, we provide a sentence with two words removed. The two words are heterographs (same pronunciation but different spelling) for two synonyms (same meaning). We provide the lengths of the two words. Find the two words.


Too often, software in our most critical systems is developed and used without truly understanding or trusting that it works properly across all conditions. We must close this gap. Read our joint report, “Closing the Software Understanding Gap,” to learn more.…
National Mentorship Month is a great time to celebrate how mentorship drives careers at NSA. Learn how it’s impacted our team. bit.ly/4fnU4uo #mentorship #mentorshipmonth
