December 6, 2023
Via: CSO OnlineIn a new advisory that shows why it’s critical to keep Adobe ColdFusion deployments up to date, the US Cybersecurity and Infrastructure Security Agency (CISA) warns that two federal agencies were breached by attackers in June through an unpatched vulnerability […]
September 25, 2023
Via: CSO OnlineA series of attacks targeting a Southeast Asian government has been found to be carried out by distinct threat actors affiliated with Chinese interests, according to Unit 42, the Palo Alto research arm closely studying the attacks. Initially thought to […]
August 8, 2023
Via: Government ExecutiveAnew report has found that cyberattacks targeting government agencies and the public sector increased at an alarming rate in recent months, as threat actors unleashed a slate of novel malware campaigns that impacted financial institutions, healthcare services and critical infrastructure […]
May 24, 2023
Via: CSO OnlineThe US Department of Treasury has imposed sanctions on four entities and one individual involved in illicit revenue generation and malicious online activities to generate revenue for the Democratic People’s Republic of Korea’s (North Korea) activities. The entities and individuals […]
March 21, 2023
Via: CSO OnlineOrganizations in developed countries are not as prepared for cybersecurity incidents compared to those in developing countries, according to Cisco’s Cybersecurity Readiness Index, released today. Countries that were found to be most mature in their overall cybersecurity readiness included Asia-Pacific […]
Cybersecurity, Industry, Workforce
December 30, 2022
Via: NextgovGovernment needs to expand where it recruits to fill open cyber positions going into 2023 as the threat of cyberattacks makes filling these positions vital, according to experts. “For cyber talent, one of the biggest realities is that we have […]
November 11, 2022
Via: ArsTechnicaMicrosoft on Thursday fingered Russia’s military intelligence arm as the likely culprit behind ransomware attacks last month that targeted Polish and Ukrainian transportation and logistics organizations. If the assessment by members of the Microsoft Security Threat Intelligence Center (MSTIC) is […]
October 12, 2022
Via: CSO OnlineA new report published by Booz Allen Hamilton provides detailed insight into global cyber threats posed by the People’s Republic of China (PRC). The China Cyber Threat Report outlines Beijing’s chief motivations for carrying out cyberattacks or espionage, the key […]
September 29, 2022
Via: CIOThe discovery of the Log4j vulnerability in December 2021 is one of the more recent and prominent reminders of why cybersecurity teams need to implement a zero-trust security architecture. Not that they should need reminders. Incidents are happening every day, […]
June 21, 2022
Via: CIOStorage can no longer be an afterthought for CIOs. The massive cybersecurity threats that daily beset enterprise organizations have completely recalibrated how enterprise storage needs to be calculated into the corporate overall cybersecurity strategy. Keeping storage separate, as if in […]
June 9, 2022
Via: CSO OnlineViruses and other malware spreading for sinister or baffling reasons has been a staple of cyberpunk novels and real-life news stories alike for decades. And in truth, there have been computer viruses on the internet since before it was the […]
May 19, 2022
Via: ZDnetThe cyber offensive against Ukraine continues with malware attacks and the spread of misinformation, according to security researchers. So far, Russian, pro-Russian, and Belarusian cyberattackers have employed the most comprehensive array of methods to achieve “tactical and strategic objectives, directly […]
April 28, 2022
Via: CSO OnlineHacking groups closely linked to the Russian government have made nearly 40 destructive attacks against hundreds of Ukrainian targets since the start of the invasion, according to a report issued by Microsoft. The attacks have been largely, but not exclusively, […]
April 20, 2022
Via: Dark ReadingThe US, Australia, Canada, New Zealand, and the UK today issued a detailed joint advisory on the increased risk of cyberattacks out of Russia — both nation-state espionage and cybercriminal activity. The advisory, issued by the Cybersecurity and Infrastructure Security […]
April 6, 2022
Via: CSO OnlineAs fears mount over the prospects of a “cyberwar” initiated by the Russian government, the number of identified Russian threat actors also continues to climb. Last week CrowdStrike publicly revealed a Russia-nexus state-sponsored actor that it tracks as Ember Bear. […]
March 28, 2022
Via: CSO OnlineThe U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Energy (DOE) have issued a joint cybersecurity advisory (CSA) on two intrusion campaigns conducted by state-sponsored Russian cyber actors against U.S. and […]
March 23, 2022
Via: CSO OnlineEarlier this month, Mandiant announced that it had responded to an intrusion by a Chinese-backed hacking group, APT41, that targeted a U.S. state government’s computer network. The security company ultimately discovered a persistent effort that allowed the malicious hackers to […]
March 7, 2022
Via: CSO OnlineThe idea of the cyber kill chain was first developed by Lockheed Martin more than a decade ago. The basic idea is that attackers perform reconnaissance, find vulnerabilities, get malware into victim systems, connect to a command-and-control (C2) server, move […]
February 28, 2022
Via: CSO OnlineThe invasion of Ukraine by Russia is reason enough for all CISOs to place their teams at a heightened state of alert and readiness in the event of deleterious cyber actions by nation-state actors or the cybercriminal groups. Three areas […]
February 28, 2022
Via: CSO OnlineWiper malware has been detected abusing legitimate drivers and targeting Active Directory servers amid ongoing Russian military conflict in Ukraine. The campaign reflects a growing trend of malware use during geopolitical crises with organizations urged to mitigate risks. Discovered by […]