Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, “nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities.” These actors pose a critical threat to United States infrastructure and protected data, and […]

The post Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity appeared first on Security Intelligence.

Continue reading Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

Host of House panels getting briefed on major Chinese hacker telecom breaches

The reported scope of the Salt Typhoon hacks has expanded in recent days and weeks, from the incoming president to top U.S. officials.

The post Host of House panels getting briefed on major Chinese hacker telecom breaches appeared first on CyberScoop.

Continue reading Host of House panels getting briefed on major Chinese hacker telecom breaches

Software Makers Encouraged to Stop Using C/C++ by 2026

The Cybersecurity and Infrastructure Security Agency and Federal Bureau of Investigation assert that C, C++, and other memory-unsafe languages contribute to potential security breaches. Continue reading Software Makers Encouraged to Stop Using C/C++ by 2026

Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead

The interim Federal Chief Information Security Officer spelled out some 2025 agenda items for feds at CyberTalks.

The post Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead appeared first on CyberScoop.

Continue reading Threat awareness, cloud security, quantum computing among chief agency cyber policy priorities ahead

Report: Chinese hackers used telecom access to go after phones of Trump, Vance

U.S. authorities said they are investigating “unauthorized access to telecommunications infrastructure” by hackers linked to China.

The post Report: Chinese hackers used telecom access to go after phones of Trump, Vance appeared first on CyberScoop.

Continue reading Report: Chinese hackers used telecom access to go after phones of Trump, Vance

Exploited: Cisco, SharePoint, Chrome vulnerabilities

Threat actors have been leveraging zero and n-day vulnerabilities in Cisco security appliances (CVE-2024-20481), Microsoft Sharepoint (CVE-2024-38094), and Google’s Chrome browser (CVE-2024-4947). CVE-2024-20481 (Cisco ASA/FTD) In the past few da… Continue reading Exploited: Cisco, SharePoint, Chrome vulnerabilities

BDO: Public Boards Seek a Fine Balance Between Innovation and Risk

Driving growth and investing in emerging technologies — while practicing caution — are strategic priorities for boards in the year ahead, according to the advisory firm’s 2024 survey. Continue reading BDO: Public Boards Seek a Fine Balance Between Innovation and Risk

Task force unveils cyber recommendations for the next president

The 40-member panel has suggestions for whoever wins, from how to handle regulations to deterring malicious hackers.

The post Task force unveils cyber recommendations for the next president appeared first on CyberScoop.

Continue reading Task force unveils cyber recommendations for the next president

What’s behind the 51% drop in ransomware attacks?

In a world where cyber threats feel omnipresent, a recent report has revealed some unexpected good news: ransomware attacks on state and local governments have dropped by 51% in 2024. Still, this decline does not signal the end of the ransomware threat, nor should it lead to complacency. As the nature of ransomware evolves, so […]

The post What’s behind the 51% drop in ransomware attacks? appeared first on Security Intelligence.

Continue reading What’s behind the 51% drop in ransomware attacks?

Iranian hackers are going after critical infrastructure sector passwords, agencies caution

An international advisory says that the purpose of the “brute force” attacks is to sell the info to cybercrime forums.

The post Iranian hackers are going after critical infrastructure sector passwords, agencies caution appeared first on CyberScoop.

Continue reading Iranian hackers are going after critical infrastructure sector passwords, agencies caution