NSA Releases Security Guidance For DoD, Contractors On Public Networks

NSA Releases Security Guidance For DoD, Contractors On Public Networks
NSA Releases Security Guidance For DoD, Contractors On Public Networks

“The risk is not merely theoretical; these malicious techniques are publicly known and in use,” NSA notes.

Automation, ID & Zero Trust: NIST Scientists Speak

Zero-trust security “is not one single product that one can purchase off the shelf,” a NIST scientist observes. But underlying zero trust’s many component parts are a few critical elements, including identity and automation.

VPN Patch Released For 24 Federal Agencies

VPN Patch Released For 24 Federal Agencies
VPN Patch Released For 24 Federal Agencies

The patch secures a zero-day vulnerability disclosed last month and is just one of four vulnerabilities being actively exploited in Pulse Connect Secure.

CISA Investigates Possible Hacks of Federal Agencies

CISA Investigates Possible Hacks of Federal Agencies
CISA Investigates Possible Hacks of Federal Agencies

“We are working with each agency to validate whether an intrusion has occurred and will offer incident response support accordingly,” CISA’s deputy executive assistant director told Breaking Defense.

‘Mandatory’ Cyber Info Sharing Bill Coming, Says Senate Intel Chair Warner

‘Mandatory’ Cyber Info Sharing Bill Coming, Says Senate Intel Chair Warner
‘Mandatory’ Cyber Info Sharing Bill Coming, Says Senate Intel Chair Warner

“My hope is that we can create this structure… to get an early warning system,” the Senate Intel Committee chair said. “Voluntary sharing is no longer effective.”

US Agencies, Defense Companies Hacked Via VPNs

US Agencies, Defense Companies Hacked Via VPNs
US Agencies, Defense Companies Hacked Via VPNs

Threat actors are targeting one newly discovered and three previously known vulnerabilities in Pulse Connect Secure enterprise VPNs, according to a CISA emergency directive and alert, as well as blog posts by FireEye and Ivanti. “There is no indication the identified backdoors were introduced through a supply chain compromise of the company’s network or software deployment process,” FireEye noted.