Report: Chinese hackers used telecom access to go after phones of Trump, Vance

U.S. authorities said they are investigating “unauthorized access to telecommunications infrastructure” by hackers linked to China.

The post Report: Chinese hackers used telecom access to go after phones of Trump, Vance appeared first on CyberScoop.

Continue reading Report: Chinese hackers used telecom access to go after phones of Trump, Vance

Task force unveils cyber recommendations for the next president

The 40-member panel has suggestions for whoever wins, from how to handle regulations to deterring malicious hackers.

The post Task force unveils cyber recommendations for the next president appeared first on CyberScoop.

Continue reading Task force unveils cyber recommendations for the next president

Iranian hackers are going after critical infrastructure sector passwords, agencies caution

An international advisory says that the purpose of the “brute force” attacks is to sell the info to cybercrime forums.

The post Iranian hackers are going after critical infrastructure sector passwords, agencies caution appeared first on CyberScoop.

Continue reading Iranian hackers are going after critical infrastructure sector passwords, agencies caution

Tens of thousands of IPs vulnerable to Fortinet flaw dubbed ‘must patch’ by feds

The Shadowserver Foundation put the figure at around 87,000 for a vulnerability rated as critical and first discovered in February.

The post Tens of thousands of IPs vulnerable to Fortinet flaw dubbed ‘must patch’ by feds appeared first on CyberScoop.

Continue reading Tens of thousands of IPs vulnerable to Fortinet flaw dubbed ‘must patch’ by feds

What’s new from this year’s Counter Ransomware Initiative summit, and what’s next

Action plans, different kinds of meetings and more have all been in the mix, top administration officials told CyberScoop.

The post What’s new from this year’s Counter Ransomware Initiative summit, and what’s next appeared first on CyberScoop.

Continue reading What’s new from this year’s Counter Ransomware Initiative summit, and what’s next

Cyber experts applaud the new White House cybersecurity plan

First, there was a strategy. Now, there’s a plan. The Biden Administration recently released its plan for implementing the highly anticipated national cybersecurity strategy published in March. The new National Cybersecurity Strategy Implementation Plan (NCSIP) lays out specific deadlines and responsibilities for the White House’s vision for cybersecurity. The plan is being managed by the […]

The post Cyber experts applaud the new White House cybersecurity plan appeared first on Security Intelligence.

Continue reading Cyber experts applaud the new White House cybersecurity plan

CISA Aims For More Robust Open Source Software Security for Government and Critical Infrastructure

The agency’s roadmap outlines a plan for prioritizing where open source software makes infrastructure potentially vulnerable. Continue reading CISA Aims For More Robust Open Source Software Security for Government and Critical Infrastructure

CISA Order Highlights Persistent Risk at Network Edge

The U.S. government agency in charge of improving the nation’s cybersecurity posture is ordering all federal civilian agencies to take new measures to restrict access to Internet-exposed networking equipment. The directive comes amid a surge in attacks targeting previously unknown vulnerabilities in widely used security and networking appliances. Continue reading CISA Order Highlights Persistent Risk at Network Edge

Reporting Healthcare Cyber Incidents Under New CIRCIA Rules

Numerous high-profile cybersecurity events in recent years, such as the Colonial Pipeline and SolarWinds attacks, spurred the US government to implement new legislation. In response to the growing threat, President Biden signed the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) in March 2022. While the law has passed, many healthcare organizations remain […]

The post Reporting Healthcare Cyber Incidents Under New CIRCIA Rules appeared first on Security Intelligence.

Continue reading Reporting Healthcare Cyber Incidents Under New CIRCIA Rules

CISA or CVSS: How Today’s Vulnerability Databases Work Together

In the cybersecurity field, large databases of known threats and vulnerabilities have often been an essential resource. These catalogs show you where to focus your efforts. They’re also a good tool for prioritizing patches to increase security and mitigate the risk of disaster. As a result, these databases need to be reliable and up-to-date and […]

The post CISA or CVSS: How Today’s Vulnerability Databases Work Together appeared first on Security Intelligence.

Continue reading CISA or CVSS: How Today’s Vulnerability Databases Work Together