Microsoft recently warned that more cybercriminals have started to incorporate exploit code for the ZeroLogon vulnerability in their attacks.
Threat actor TA505, a financially motivated threat group that has been active since at least 2014, is now exploiting this vulnerability.
In the event of a critical situation or emerging risk, for example, a terrorist incident or a local COVID-19 outbreak, rapidly delivering crucial information to the right audience is imperative. Here we explore a few mass notification solutions available that can help communicate and collaborate during global and critical events and emergencies.
The Department of Justice announced that six men have been arrested and charged federally with conspiring to kidnap the Governor of Michigan, Gretchen Whitmer. According to a complaint, this group used operational security measures, including communicating by encrypted messaging platforms and used code words and phrases in an attempt to avoid detection by law enforcement.
U.S. Secretary of Transportation Elaine L. Chao announced the launch of this year’s Stop. Trains Can’t. public education campaign, which will run through November 8. This national $6.6 million safety campaign will run on radio, digital, and social media, educating drivers not to gamble with their lives at rail grade crossings. The campaign will also target high-risk highway-railway crossings in Alabama, Arizona, California, Georgia, Indiana, Tennessee, and Texas.
The National Security Agency announced the official launch of the Center for Cybersecurity Standards (CCSS) in the Cybersecurity Directorate. This office will lead NSA’s Cybersecurity mission to engage with standards bodies to communicate security requirements and influence standards to secure our National Security Systems and provide support to the Defense Industrial Base (DIB).
McAfee and the University of California, Berkeley’s Center for Long-Term Cybersecurity (CLTC) released a new research study, MITRE ATT&CK as a Framework for Cloud Threat Investigation, developed by CLTC researchers. The report focuses on threat investigation in the cloud through the lens of the most widely adopted framework, MITRE ATT&CK.
Acting Secretary of Homeland Security Chad F. Wolf released the Department of Homeland Security’s (DHS) Homeland Threat Assessment (HTA). This first-of-its-kind report synthesizes threat information across DHS including intelligence and operational components.
The National Security Agency (NSA) has chosen Cal State San Bernardino to be a leader of its core workforce development initiative, selecting it for a $10.5 million grant and naming the university’s Cybersecurity Center as the Community National Center for Cybersecurity Education.
This prestigious designation illustrates CSUSB’s continued prominence as the premier institution of higher education for cybersecurity education and took effect Sept. 18, 2020.
Emotet — a sophisticated Trojan commonly functioning as a downloader or dropper of other malware — resurged in July 2020, after a dormant period that began in February. Since August, CISA and MS-ISAC have seen a significant increase in malicious cyber actors targeting state and local governments with Emotet phishing emails. This increase has rendered Emotet one of the most prevalent ongoing threats.
The Cybersecurity and Information Security Agency (CISA) has released an infographic mapping analysis of 44 of its Risk and Vulnerability Assessments (RVAs) conducted in Fiscal Year 2019 to the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework.