Threat actors are targeting one newly discovered and three previously known vulnerabilities in Pulse Connect Secure enterprise VPNs, according to a CISA emergency directive and alert, as well as blog posts by FireEye and Ivanti. “There is no indication the identified backdoors were introduced through a supply chain compromise of the company’s network or software deployment process,” FireEye noted.
By Brad D. WilliamsSign up and get the latest news in your inbox.
We will never sell or share your information without your consent. See our privacy policy.“The innovations… and the lessons learned from these responses will be used to improve future unified, whole of government responses to significant cyber incidents,” the White House says.
By Brad D. WilliamsThe Midshipmen edged out other competitors in this year’s virtual cyber competition to bring home the prestigious trophy. “I think the structure and dynamic of our team is what makes us so effective: We are completely student run, trained, and managed,” Gallagher said.
By Brad D. WilliamsThe White House Executive Order comes on the same day that CISA and CNMF issue SolarWinds-related malware analysis and NSA-CISA-FBI issue a joint advisory warning of ongoing SVR exploitation of known vulnerabilities in common products.
By Brad D. Williams“That was a list of about as many awful things in 10 minutes as I may have heard in recent time,” Sen. Mark Warner said of the DNI’s threat assessment. Top of mind: China, cyber, and emerging tech.
By Brad D. WilliamsThis operation — which involved the FBI removing malware from privately owned and operated victim servers without advance notice — could be unprecedented, at least at this scale.
By Brad D. Williams“Imagine you work at a chemical research part of a base. Its location is secret. But you have a smart car. Through other espionage activities, I found out you work there. I hack your phone or your car’s online account,” Keatron Evans said. “I track your location as you go to work every day. Now I know the specific GPS location of your work facility. It goes downhill quickly from there.”
By Arie Egozi and Brad D. WilliamsThe administration is set to nominate two NSA veterans, one for the newly created national cybersecurity director position and one to head CISA. The new leaders, once confirmed by Congress, will have their hands full.
By Brad D. WilliamsMiddle Eastern sources say Sunday’s cyberattack caused a blackout at the Natanz facility and damaged centrifuges. It occurred on the same day Defense Secretary Lloyd Austin landed in Israel for talks, a day after Iran announced new centrifuges at Natanz, and within a week of the US restarting talks to revive the JCPOA.
By Arie Egozi and Brad D. WilliamsTeams will face a series of rigorous challenges over three days as they compete to win the prestigious NCX trophy.
By Brad D. WilliamsThe guidance will “outline threats and risks to 5G infrastructure,” NSA Executive Director Noble said. It’s one way NSA is “focusing our expertise in cryptography and cybersecurity to help industry and government to integrate security into all aspects of the 5G ecosystem.”
By Brad D. WilliamsThe RFP includes a guide to help startups, small businesses, and non-traditional defense contractors participate. AI ethics and security are focal points.
By Brad D. Williams“It’s the presence of this insecure gear in our networks that’s the threat, not the source of funding used to purchase it,” Commissioner Carr said.
By Brad D. Williams“Some do not believe this is an appropriate role for the government…” Republican Sen. Young said in an interview. “…[B]ut, simply, the private sector and venture capital community is not up to shouldering this task on its own.”
By Brad D. Williams