Tag: government
-
Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices
by
in SecurityNewsThe precedent-setting ruling from a Northern California federal judge could lead to massive damages against NSO Group, whose notorious spyware has been reportedly used by various governments worldwide.]]> First seen on therecord.media Jump to article: therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users
-
US order is a reminder that cloud platforms aren’t secure out of the box
by
in SecurityNews
Tags: access, best-practice, breach, business, cisa, ciso, cloud, control, cyber, cybersecurity, defense, fedramp, google, government, guide, identity, incident, incident response, infrastructure, intelligence, international, login, mfa, microsoft, monitoring, network, risk, saas, service, software, toolThis week’s binding directive to US government departments to implement secure configurations in cloud applications, starting with Microsoft 365 (M365), is a reminder to all CISOs that cloud platforms, even from major providers, aren’t completely secure out of the box.”Cloud stuff is easy to manage, easy to deploy,” said Ed Dubrovsky, chief operating officer and…
-
Federal Cyber Operations Would Downgrade Under Shutdown
by
in SecurityNewsGovernment Shutdown Could See Thousands of Federal Cyber Workers Furloughed. A looming shutdown could sharply reduce the Cybersecurity and Infrastructure Security Agency’s operations, furloughing two-thirds of its workforce and exposing critical federal networks to heightened cyber threats, especially as malicious actors target vulnerable systems during the holiday season. First seen on govinfosecurity.com Jump to article:…
-
Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
by
in SecurityNews
Tags: access, ai, authentication, best-practice, business, china, cisa, cisco, cloud, computer, control, cyber, cybersecurity, data, data-breach, email, extortion, finance, framework, fraud, google, government, guide, hacker, identity, incident, incident response, infrastructure, intelligence, international, Internet, jobs, korea, kubernetes, law, lessons-learned, linux, login, malicious, microsoft, mobile, monitoring, network, north-korea, office, password, regulation, risk, risk-management, russia, service, software, tactics, technology, threat, tool, updateCheck out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the U.S. cyber incident response framework; the CIS Benchmarks; and local and state governments’ cyber challenges. Dive…
-
Russia fires its biggest cyberweapon against Ukraine
by
in SecurityNews
Tags: access, attack, breach, cisa, communications, country, cyber, cyberattack, defense, email, governance, government, group, incident response, infrastructure, intelligence, microsoft, mitigation, mobile, risk, russia, service, strategy, threat, ukraine, vulnerability, warfareUkraine has faced one of the most severe cyberattacks in recent history, targeting its state registries and temporarily disrupting access to critical government records.Ukrainian Deputy Prime Minister Olga Stefanishyna attributed the attack to Russian operatives, describing it as an attempt to destabilize the country’s vital digital infrastructure amid the ongoing war.”It’s already clear that the…
-
Earth Koshchei’s Rogue RDP Campaign: A Sophisticated APT Attack Targets Governments and Enterprises
by
in SecurityNewsTrend Micro has unveiled a large-scale rogue remote desktop protocol (RDP) campaign conducted by the threat group Earth Koshchei. Known for their espionage operations, Earth Koshchei leveraged spear-phishing emails and... First seen on securityonline.info Jump to article: securityonline.info/earth-koshcheis-rogue-rdp-campaign-a-sophisticated-apt-attack-targets-governments-and-enterprises/
-
2035 Quantum Encryption Deadline Still Achievable
by
in SecurityNewsCISA Says 2035 Quantum Deadline Remains Achievable Despite Recent Breakthroughs. The federal government’s 2035 mandate to adopt quantum-resistant encryption remains feasible despite technological advancements in quantum computing, a top official for the U.S. cyber defense agency told ISMG, but experts warn challenges such as bureaucratic delays and financial costs persist. First seen on govinfosecurity.com Jump…
-
UK ICO Criticizes Google Advertising Policy Update
by
in SecurityNewsData Protection Authority Says Change Isn’t Green Light for Device Fingerprinting. The U.K. data regulator blasted Google Thursday for a changes to policies governing online advertising the government agency says amount to bestowing permission to track users by the indelible fingerprint of their devices. Businesses do not have free rein to use fingerprinting, the office…
-
US Organizations Still Using Kaspersky Products Despite Ban
by
in SecurityNewsBitsight found that 40% of US organizations who used Kaspersky products before the government ban came into effect still appear to be using them First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/us-orgs-kaspersky-despite-ban/
-
US government urges high-ranking officials to lock down mobile devices following telecom breaches
by
in SecurityNewsThe move to urge Americans to use end-to-end encrypted apps comes as China-backed gangs are hacking into phone and internet giants. First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/19/us-government-urges-high-ranking-officials-to-lock-down-mobile-devices-following-telecom-breaches/
-
CISA Releases Draft of National Cyber Incident Response Plan
by
in SecurityNewsThe draft of the long-awaited update to the NCIRP outlines the efforts, mechanisms, involved parties, and decisions the US government will use in response to a large-scale cyber incident. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/cisa-releases-draft-of-national-cyber-incident-response-plan
-
US eyes ban on TP-Link routers amid cybersecurity concerns
by
in SecurityNews
Tags: attack, business, china, compliance, computer, corporate, country, cyber, cyberattack, cybercrime, cybersecurity, ddos, defense, espionage, exploit, flaw, government, hacking, infrastructure, intelligence, law, malicious, microsoft, network, risk, router, technology, threat, vulnerability, wifiThe US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for American homes and small businesses, amid concerns about national security risks. Reports suggest these routers have vulnerabilities that cybercriminals exploit to compromise sensitive enterprise data.Investigations by the Commerce, Defense, and Justice Departments indicate that the routers may have been…
-
US considers banning TP-Link routers over cybersecurity concerns
by
in SecurityNewsThe U.S. government may ban TP-Link routers in 2025 if investigations confirm their use could pose a national security risk. The U.S. government is investigating whether TP-Link routers, linked to cyberattacks, pose a national security risk, the Wall Street Journal reported. According to the WSJ, the U.S. government is considering banning TP-Link routers starting in…
-
Russia-linked APT29 group used red team tools in rogue RDP attacks
by
in SecurityNewsRussia-linked APT29 group uses malicious RDP configuration files, adapting red teaming methods for cyberattacks to compromise systems. In October 2024, the Russia-linked cyber espionage group APT29 (aka Earth Koshchei, SVR group, Cozy Bear, Nobelium, BlueBravo, Midnight Blizzard, and The Dukes) used rogue RDP attacks via phishing emails targeting governments, think tanks, and Ukrainian entities to steal data and install malware. The…
-
US CISA Endorses Encrypted Apps Amid Chinese Telecom Hack
by
in SecurityNewsCISA Recommends Strict Mobile Security Measures Following Salt Typhoon Telecom Hack. The Cybersecurity and Infrastructure Security Agency’s latest guidance calls on top U.S. political and government officials to adopt stricter mobile security measures in response to the Salt Typhoon hacking campaign, a Chinese espionage effort that has infiltrated major telecom systems. First seen on govinfosecurity.com…
-
CISA urges senior government officials to lock down mobile devices amid ongoing Salt Typhoon breach
by
in SecurityNewsA 5-page advisory provided troves of guidance for both Apple and Android users, urging all “highly targeted individuals” to rely on the “consistent use of end-to-end encryption.”]]> First seen on therecord.media Jump to article: therecord.media/cisa-urges-senior-officials-to-lock-down-devices-salt-typhoon
-
US considers banning TP-Link routers over cybersecurity risks
by
in SecurityNewsThe U.S. government is considering banning TP-Link routers starting next year if ongoing investigations find that their use in cyberattacks poses a national security risk. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-considers-banning-tp-link-routers-over-cybersecurity-risks/
-
CISA pushes guide for high-value targets to secure mobile devices
by
in SecurityNewsThe guide comes as the government continues to deal with the fallout of the Salt Typhoon hack. First seen on cyberscoop.com Jump to article: cyberscoop.com/cisa-mobile-security-best-practices-salt-typhoon/
-
CISA urges switch to Signal-like encrypted messaging apps after telecom hacks
by
in SecurityNewsToday, CISA urged senior government and political officials to switch to end-to-end encrypted messaging apps like Signal following a wave of telecom breaches across dozens of countries, including eight carriers in the United States. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-urges-switch-to-signal-like-encrypted-messaging-apps-after-telecom-hacks/
-
Recorded Future CEO applauds “undesirable” designation by Russia
by
in SecurityNewsRecorded Future, an American threat intelligence company, has become the first cybersecurity firm designated by the Russian government as an “undesirable” organization. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/recorded-future-ceo-applauds-undesirable-designation-by-russia/
-
US Government Issues Cloud Security Requirements for Federal Agencies
by
in SecurityNewsA CISA Directive sets out actions all US federal agencies must take to identify and secure cloud tenants in their environments First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cloud-security-federal-agencies/
-
Recorded Future Tagged as ‘Undesirable’ in Russia
by
in SecurityNewsThe Russian government accuses the Mastercard-owned firm of participating in the collection and analysis of data on the actions of the Russia’s armed forces. The post Recorded Future Tagged as ‘Undesirable’ in Russia appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/recorded-future-tagged-as-undesirable-in-russia/
-
APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP
by
in SecurityNewsThe Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files.The activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a “rogue RDP” technique that was previously First seen on…
-
Key strategies to enhance cyber resilience
by
in SecurityNews
Tags: attack, awareness, backup, banking, breach, business, ceo, compliance, control, crowdstrike, cyber, cybersecurity, data, finance, government, group, healthcare, incident, incident response, infrastructure, insurance, metric, network, phishing, programming, ransom, ransomware, resilience, risk, security-incident, service, skills, software, strategy, supply-chain, technology, threat, training, update, vulnerability, windowsThe faulty CrowdStrike software update that triggered IT outages on a global scale in July was a sobering reminder of the importance of incident response and business continuity plans.The update caused more than eight million Windows devices to crash and take down with them airline reservation systems, hospital and government services, financial and banking applications…
-
FBI Warns of HiatusRAT Targeting Vulnerable IoT Devices
by
in SecurityNewsMalware Targets Vulnerable Web Cameras and DVRs Worldwide. Hackers are deploying brute force attacks and using unpatched vulnerabilities to target Chinese-manufactured web cameras and DVRs, the FBI is warning. Targets include a range of organizations in Taiwan and at least one U.S. government server. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/fbi-warns-hiatusrat-targeting-vulnerable-iot-devices-a-27081
-
10 Major Ransomware Attacks And Data Breaches In 2024
by
in SecurityNewsMajor ransomware attacks and data breaches in 2024 included the Change Healthcare attack, data theft attacks targeting Snowflake customers and the China-linked Salt Typhoon campaign against U.S. government officials. First seen on crn.com Jump to article: www.crn.com/news/security/2024/10-major-ransomware-attacks-and-data-breaches-in-2024
-
How NCS is tackling the enterprise IT market
by
in SecurityNewsThe technology service provider is counting on its government experience, global expert network and cyber security capabilities to penetrate the enterprise IT market First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366617068/How-NCS-is-tackling-the-enterprise-IT-market
-
US Unveils New National Cyber Incident Response Plan
by
in SecurityNewsThe draft plan is designed to help businesses understand how the government will support them during a cyber incident First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/us-cyber-incident-response-plan/
-
The shifting security landscape: 2025 predictions and challenges
by
in SecurityNewsAs the borderless threat ecosystem poses new challenges for companies and governments worldwide, CISA’s 2025-2026 International Plan aims to address this problem. CISA’s … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/17/2025-cybersecurity-predictions/