CVEs CISA warns of high-severity vulnerability in once-popular Microsoft product Security agency adds CVE-2012-4792 to its catalogue of known vulns and warns it can "execute arbitrary code via a crafted web site"
cyberattack Cyberattack disrupts 911 emergency services in California Incident blamed on 'relatively new' gang of cybercriminals.
Cybersecurity Feds to CIOs: Actively ask your vendors if they’ve done a SQLi audit... Fix up, look sharp: Uncle Sam is running out of patience with tech firms shipping insecure software. Vendors? Get familiar with the phrase "query parameterization"...
Cybersecurity CISA breach: Hackers gained access to chemical sector's vulnerability assessments Cybersecurity agency's cybersecurity appliance breached (yes, everything is broken) but no exfiltration seen says CISA
Members only cybersecurity FBI reveals Zero Trust adoption plans in $8 billion IT budget Crime fighters prioritise internal network security in the wake of major data breach
ransomware Fresh Black Basta TTPs revealed as CISA says CNI hit Ransomware group using "Backstab" to kill EDR processes.
News CISA issues warning over 'Midnight Blizzard' Microsoft attack CISA has posted a new directive for US government agencies regarding targeted attacks by the Midnight Blizzard hacking team that also hit Microsoft
CISA CISA talks up "game-changing" new data collection powers under Circia CISA is moving into what it hopes is the home stretch for drafting and enforcing stricter reporting rules for cybersecurity incidents
operational technology Missing vulnerabilities and threadbare staff: CISA ill-equipped to support on OT security: Watchdog CISA has just two federal staff and five contractor staff working on its OT-specific threat hunting and/or incident response services...
cybersecurity US gov tells software suppliers exactly how it wants them to develop secure code As CISA reportedly admits two of its systems were breached in February due to Ivanti flaws
Members only CISA How secure is your package repo? CISA defines four levels of security maturity, starting at zero
cyberattack Hack back: US disconnects Volt Typhoon "This actor is not doing the quiet intelligence collection and theft of secrets... they can disrupt major services if, and when, the order comes down,"
Members only CISA CISA's going to name and shame vendors on insecure software "When we see a vulnerability or intrusion campaign that could have been reasonably avoided if the software manufacturer had aligned to secure by design principles, we’ll call it out"
News Ivanti and Veeam bugs fall under attack CISA has sounded the alarm over a pair of actively targeted vulnerabilities in Ivanti and Veeam software
Interviews Featured The Big Interview: CISA’s $7 billion CDM program aims to run pan-federal cybersecurity. Is it delivering? "We have gotten very smart on how to do business with agencies and build in flexibility into our contracting vehicles. We took an approach early on to divide and conquer..."
Citrix Citrix zero day used to attack critical infrastructure -- IOCs and detections now available Attackers dropped a webshell, collected and exfiltrated Active Directory data, then ran into some healthy obstacles...
Azure Microsoft clams up over critical Azure key breach, security incident as attackers breach US agencies Following a major security breach involving US federal agencies, Microsoft refuses to provide details on the incident
Cybersecurity Known exploited list: 15 million systems still exposed ... and probably shot to high heaven with malware.
Cybersecurity US agencies warn over "Royal" ransomware rise Phishing is key threat vector and a Blue Team bête noire...
Cybersecurity IBM high speed file transfer software exploited by hackers A pre-auth RCE in IBM Aspera Faspex is being exploited in the wild
Cybersecurity Critical controller bug could trigger traffic chaos: Software vendor ignores CISA outreach One of 14 new advisories on vulnerable ICS software...
Featured Defending against Hive ransomware: It's time to use the attackers' tools And, um, do you know how to restore from backup without Active Directory?
Cybersecurity GIGABYTE drivers are getting exploited warns CISA as 2018 bugs come back to bite POCs have circulated for years...
Cybersecurity US agencies ordered to run asset discovery scans every single week Knock Knock. Who's there? Multiple APTs, patch your shit.
Cybersecurity Industrial software vuln actively exploited says CISA – but little evidence of real-world attacks Attacks against ICS and OT systems are an increasingly real concern though.