The global survey offers cyber security professionals the opportunity to share their thoughts and the chance to win $ 1,000 in Amazon vouchers
Posts tagged "State"
The global state of the cyber security industry 2022
This exclusive report aims to keep cyber security professionals abreast of today’s threats and highlight the areas in which CISOs are allocating security budgets to mitigate the risks facing their org…
APT41 Spies Broke Into 6 US State Networks via a Livestock App
The China-affiliated state-sponsored threat actor used Log4j and zero-day bugs in the USAHerds animal-tracking software to hack into multiple government networks.
Iranian State Broadcaster Clobbered by ‘Clumsy, Buggy’ Code
Researchers said a Jan. 27 attack that aired footage of opposition leaders calling for assassination of Iran’s Supreme Leader was a clumsy and unsophisticated wiper attack.
Threatpost
Relentless Log4j Attacks Include State Actors, Possible Worm
More than 1.8 million attacks, against half of all corporate networks, have already launched to exploit Log4Shell.
Threatpost
Pegasus Spyware Infects U.S. State Department iPhones
It’s unknown who’s behind the cyberattacks against at least nine employees’ iPhones, who are all involved in Ugandan diplomacy.
Three US state laws are providing safe harbor against breaches
Three US state laws passed between 2018 and 2021 are encouraging organizations not currently following a cybersecurity control framework to look to update their security programs
The State of Incident Response: Measuring Risk and Evaluating Your Preparedness
Grant Oviatt, director of incident-response engagements at Red Canary, provides advice and best practices on how to get there faster.
Threatpost
InkySquid State Actor Exploiting Known IE Bugs
The North Korea-linked APT group leverages known Internet Explorer vulns for watering-hole attacks.
Threatpost
IOTW: Washington State Audit Into Hacking Fraud Is Compromised In A Hacking Ince…
The ESD is insistent that this new breach—after the criticism it faced for the spring breach—is not responsible for this incident. Instead, the blame is placed on Accellion, a third-party file transfe…