Five Eyes agencies detail how Chinese hackers breached US infrastructure

The National Security Agency (NSA) and Five Eyes partner agencies have identified indicators of compromise associated with a People’s Republic of China (PRC) state-sponsored cyber actor dubbed Volt Typhoon, which is using living off the land techniques… Continue reading Five Eyes agencies detail how Chinese hackers breached US infrastructure

Biden Picks New NSA head, Key to Support of Ukraine, Defense of US Elections

U.S. President Joe Biden has picked a new NSA and Cyber Command leader to oversee America’s cyber warfare and defense.
The post Biden Picks New NSA head, Key to Support of Ukraine, Defense of US Elections appeared first on SecurityWeek.
Continue reading Biden Picks New NSA head, Key to Support of Ukraine, Defense of US Elections

CISA, NSA Issue New IAM Best Practice Guidelines

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a new 31-page document outlining best practices for identity and access management (IAM) administrators.  As the industry increasingly moves towards cloud and hybrid computing environments, managing the complexities of digital identities can be challenging. Nonetheless, the importance of IAM cannot […]

The post CISA, NSA Issue New IAM Best Practice Guidelines appeared first on Security Intelligence.

Continue reading CISA, NSA Issue New IAM Best Practice Guidelines

CISA, NSA Issue New IAM Best Practice Guidelines

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a new 31-page document outlining best practices for identity and access management (IAM) administrators.  As the industry increasingly moves towards cloud and hybrid computing environments, managing the complexities of digital identities can be challenging. Nonetheless, the importance of IAM cannot […]

The post CISA, NSA Issue New IAM Best Practice Guidelines appeared first on Security Intelligence.

Continue reading CISA, NSA Issue New IAM Best Practice Guidelines

NSA Releases New Best Practices for Securing Home Networks

You depend on your home network for binge-watching your favorite shows and ordering the perfect pair of shoes. When it’s time to pay bills or manage your retirement accounts, you likely head online as well. Not to mention that home networks make it possible for you to work from home and for your kids to […]

The post NSA Releases New Best Practices for Securing Home Networks appeared first on Security Intelligence.

Continue reading NSA Releases New Best Practices for Securing Home Networks

Turla’s Snake malware network disrupted by Five Eyes’ authorities

The US Justice Department announced the completion of court-authorized operation MEDUSA, to disrupt a global peer-to-peer network of computers compromised by sophisticated malware, called “Snake” (aka “Uroburos”), that the US Government att… Continue reading Turla’s Snake malware network disrupted by Five Eyes’ authorities

5 steps to building NSA-level access control for your app

Access control has become a main concern when it comes to developing secure web applications, and the NSA has a lot to say about it. Especially when it comes to the biggest access management pitfall developers make. In 2021 OWASP listed ‘Broken Access … Continue reading 5 steps to building NSA-level access control for your app

NSA Shares Guidance on Maturing ICAM Capabilities for Zero Trust

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.
The post NSA Shares Guidance on Maturing ICAM Capabilities for Zero Trust appeared first on SecurityWeek.
Continue reading NSA Shares Guidance on Maturing ICAM Capabilities for Zero Trust

North Korea targets US, South Korean hospitals with ransomware to fund further cyber operations

US and South Korean agencies have issued a joint cybersecurity advisory describing the tactics, techniques and procedures used by North Korean hackers to deploy “state-sponsored” ransomware on hospitals and other organizations that can be c… Continue reading North Korea targets US, South Korean hospitals with ransomware to fund further cyber operations