Skip to content
TSA to issue cybersecurity requirements for US rail, aviation sectors.
Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.
Accessed on 10 October 2021, 1313 UTC.
Please click link or scroll down to read your selections.
In a move to offer its customers a consolidated suite of security applications, One Identity has acquired OneLogin, an IAM (identity and access management) provider, adding to its own set of PAM (privileged access management, IGA…
The US federal agency puts pressure on telecom carriers to put better authentication, account protection safeguards in place.
Greater complexity and interdependence among systems gives attackers more opportunity for widespread, global damage, say government and industry experts.
The FoggyWeb post-exploitation backdoor is persistent and steals configuration databases and security token certificates.
The automated bots are highly successful because they effectively emulate legitimate service providers.
The MITRE ATT&CK/VERIS collaboration aims to create a common dictionary for communicating information about security incidents.
The sanctions are aimed to cut ransomware gangs off from their revenue. Advisory on sanctions risks regarding ransomware payments also updated.
The federal government wants consumer software to have cybersecurity labels; experts question the feasibility of the mandate.
US government agencies urge immediate action to look for indicators of compromise and, if found, take recommended steps to mitigate.
A new McAfee report details the tools and techniques an APT group used to go undetected on a client network for over a year.
Three US nationals, working as cyber mercenaries on behalf of the United Arab Emirates, have accepted a deferred plea agreement for exploiting U.S. entities using U.S.-controlled technologies.
The OMB and CISA issue guidance to move all federal agencies to a shared zero-trust maturity model for FY22-24. The catch: No new funding.
The Azure vulnerability, which affects only those using the Jupyter Notebook feature, gives attackers access to data in databases.
This newly discovered ransomware works fast, has multiple ways to avoid detection, and preys on Windows systems with known vulnerabilities.
The Personal Information Protection Law will force global companies doing business in China to be more careful with cross-border flow of personal information.
Technology, financial, and education leaders commit to a wide range of initiatives to enhance the nation’s cybersecurity posture in collaboration with the Biden Administration.
This new, aggressive ransomware group also uses Cobalt Strike to move laterally across the network.
New research identifies four emerging ransomware groups currently affecting organizations and that show signs of becoming bigger threats in the future.
LOAD MORE For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts. Thanks for joining us today.