February 19, 2024
Via: CSO OnlineA Russian advanced persistent threat (APT) actor has been using the cross-site scripting (XSS) vulnerabilities in Roundcube webmail servers to target critical government infrastructures in Europe, according to a research by Recorded Future. The threat group, known as Winter Vivern, […]
December 6, 2023
Via: CSO OnlineIn a new advisory that shows why it’s critical to keep Adobe ColdFusion deployments up to date, the US Cybersecurity and Infrastructure Security Agency (CISA) warns that two federal agencies were breached by attackers in June through an unpatched vulnerability […]
November 16, 2023
Via: CSO OnlineWith the US Securities and Exchange Commission (SEC) having taken legal action against CISOs at both SolarWinds and Uber, security executives feel the pressure to be absolutely precise when writing up security incidents that the company has decided are material. […]
August 21, 2023
Via: Dark ReadingForeign adversaries are waging cyber espionage campaigns against the US space industry, according to a joint warning issued this week by the National Counterintelligence and Security Center (NCSC), FBI, and the Air Force Office of Special Investigations (AFOSI). The two-page […]
May 30, 2023
Via: Dark ReadingThe leak of classified Pentagon documents through a popular messaging platform is not about the leaker’s maturity, whistleblowing, or even the war. It’s about people and the need to propel and maintain a trusted workforce to mitigate insider risk proactively. […]
February 1, 2023
Via: CSO OnlineThe two biggest cloud security risks continue to be misconfigurations and vulnerabilities, which are being introduced in greater numbers through software supply chains, according to a report by Sysdig. While zero trust is a top priority, data showed that least […]
November 29, 2022
Via: Dark ReadingThe federal government has once again signaled that our traditional approach to cybersecurity, one predicated solely on prevention and perimeter defenses, is failing us. In the past two years alone, 76% of organizations were attacked by ransomware, and 66% experienced […]
August 30, 2022
Via: Dark ReadingThe Chinese state-aligned threat actor TA423 (aka Leviathan/APT40) is behind a sustained cyber-espionage campaign against countries and entities operating in the South China Sea, including organizations involved in an offshore wind farm in the Taiwan Strait. The threat actor’s most […]
August 8, 2022
Via: Dark ReadingFollowing the Colonial Pipeline hack — one of the highest-profile attacks against US critical infrastructure to date — in 2021, the Department of Homeland Security’s Transportation Security Administration (TSA) released two unprecedented Security Directives, requiring owners and operators of gas […]
May 26, 2022
Via: ZDnetResearchers have disclosed the existence of the critical “Pantsdown” vulnerability in some Quanta Cloud Technology (QCT) server models. On Thursday, cybersecurity firm Eclypsium said that several servers belonging to the data center solutions provider were still vulnerable to the bug, […]
March 29, 2022
Via: Federal News NetworkAs Russia’s invasion of Ukraine accelerates European Union defense cooperation, a watchdog said Tuesday that EU institutions face vulnerabilities on another front: cybersecurity. The warning by the European Court of Auditors covers the wide range of EU bodies — from […]
March 10, 2022
Via: Dark ReadingA months-long malicious campaign that targeted multiple US government agencies has once again highlighted the sophistication and dogged persistence of APT41, a China-backed threat actor associated with numerous cyber-espionage campaigns in recent years. Researchers at Mandiant first spotted the campaign […]
March 7, 2022
Via: CSO OnlineThe idea of the cyber kill chain was first developed by Lockheed Martin more than a decade ago. The basic idea is that attackers perform reconnaissance, find vulnerabilities, get malware into victim systems, connect to a command-and-control (C2) server, move […]
Cybersecurity, Education, Industry
January 24, 2022
Via: CSO OnlineEducation and research were the top targets for cyberattackers in 2021, with an average of 1605 attacks per organization per week, a 75% increase from 2020, according to research by Check Point Software Technologies. Pandemic’s push for digital invites threats […]
January 10, 2022
Via: CSO OnlineLast week, the U.S. Federal Trade Commission (FTC) issued a warning to companies to remediate the serious vulnerability in the popular open-source Java logging package Log4j to avoid future legal action. In issuing its notice, the FTC underscored that organizations […]
December 28, 2021
Via: Dark ReadingSecurity operation centers (SOCs) are encountering threats that quickly swivel from a hands-on keyboard attack to a wide-scale and destructive ransomware attack, or even a complex nation-state attack. Current triage and remediation by alert will likely fail in such situations. […]
December 16, 2021
Via: CSO OnlineA second vulnerability impacting Apache Log4j has been discovered as the security industry has scrambled to mitigate and fix a severe zero-day Java library logging flaw (CVE-2021-44228) dubbed Log4Shell. The new vulnerability, CVE 2021-45046, could allow attackers to craft malicious […]
October 8, 2021
Via: ZDnetSome of the cybersecurity vulnerabilities most commonly exploited by cyber criminals to help distribute ransomware are years old – but attackers are still able to take advantage of them because security updates aren’t being applied. Cybersecurity researchers at Qualys examined […]
September 30, 2021
Via: Dark ReadingMany organizations lag in patching high-severity vulnerabilities, according to a new study that reveals more than 50% of servers scanned have a weak security posture weeks and months after a security update is released. To create the “2021 Trustwave SpiderLabs […]
Cloud Computing, Cybersecurity, Tech
August 5, 2021
Via: CSO OnlineEarlier this week, the US National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) issued a joint document entitled Kubernetes Hardening Guidance. Kubernetes is an open-source orchestration system that relies on containers to automate the deployment, scaling […]