Google Threat Analysis Group researchers warn that Chinese and Iranian hackers are targeting campaign staffers for both President Donald Trump and Presidential candidate Joe Biden with phishing emails.
The Cybersecurity and Infrastructure Security Agency (CISA) has launched CISA Central, a hub for staying on top of threats and emerging risks to the nation’s critical infrastructure, whether they’re of cyber, communications or physical origin.
The National Institute of Standards and Technology (NIST) is looking for public and private sector experts to take part in an exercise that will evaluate the digital forensics community’s ability to conduct mobile- and computer-based investigations.
It is no secret that finding and recruiting strong Chief Information Security Officer (CISO) candidates is far from easy. Many CISOs typically stay in a role for a few years and subsequently are not able to dedicate adequate time to the development of junior leaders who could become the next wave of security leaders. Most organizations are forced to look externally for the experience they require. However, looking for outside hires also contributes to the shortage of potential internal leaders, as skilled professionals are often overlooked. For the security industry to thrive, this needs to change, and it starts with grooming the next generation of leaders.
According to a report from Cisco, 5G’s faster broadband (10 to 20 times faster than 4G) will enable 12 billion mobile-ready devices and IoT connections by 2022 compared to 9 billion in 2017. While this is great news for the rising number of smart device users globally, the increased connectivity can be taxing for IoT security. The combination of higher bandwidth and lower latency is a double-edged sword. While it enables new, exciting use cases like Vehicle-to-Vehicle and telemedicine, it is critical to not lose sight of the fact that it expands the scope of security threats, such as ransomware and botnets, among others.
Although the ransomware plague took a nosedive in terms of the victim count years ago, it’s still alive and kicking. It used to home in on any computers indiscriminately, but at some point, the malicious actors realized they could squeeze a lot more profit out of the enterprise than out of individual users. This shift made businesses the most coveted target for ransomware operators.
The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain on alert for malicious cyber activity targeting potential disaster victims and charitable donors following a hurricane.
The Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) was formed as a nonprofit by a group of U.S.-based maritime critical infrastructure stakeholders to promote cybersecurity information sharing throughout the community.
The U.S. Army's National Training Center at Fort Irwin, California and Fort Hood, Texas were selected by DoD for their second round of 5G communications testing and experimentation.