Cybersecurity

Senate Report Highlights Lack of Government Data on Ransomware Payments

A new report details the role cryptocurrencies play in incentivizing ransomware attacks and the government’s response.

Cybersecurity

CISA Orders Agencies to Mitigate VMWare Vulnerabilities Under Deadline

Advanced adversaries appear to be exploiting the vulnerabilities to get around multifactor authentication.

Cybersecurity

Agencies Showcase Federal Cyber Progress, Outline Future Threats

Witnesses from CISA, NIST, and the GSA spoke before a House Homeland subcommittee on their current efforts to bolster the nation’s cyber defenses.

Cybersecurity

Key Convener Releases Plan for Securing Open Source Software with White House

A crucial entity within the open source ecosystem is urging prioritization of libraries that support widespread applications like internet routing, among other things.

Ideas

One Year Later: A Hacker’s View on the Cybersecurity Executive Order

Federal network adversaries have evolved in the year since the order’s signing.

Cybersecurity

US, Allied Cybersecurity Agencies, Advise Reviewing Contracts with Tech Vendors

A joint advisory from CISA, domestic partners and counterpart agencies in the Five Eyes intelligence alliance warns of a heightened threat to managed service providers and their customers.

Cybersecurity

Survey: 93% of Americans Fear Cyber Warfare Against U.S.

A consumer survey suggests Americans are taking some steps to prepare for possible cyber warfare.

Ideas

Phishing Threats Attempt to Hook New Government Victims

While the government is focused on the dangers of ransomware, phishing campaigns can circumvent the usual protections placed on its networks.

Cybersecurity

CISA Adds New Russian Malware to Cyber Advisory

The agency updated its warning regarding malware deployed by Russian state actors as the country continues war against Ukraine.

Cybersecurity

Cybersecurity Pros Signal Regulatory Challenge for Securing Industrial Control Systems

A studious adversary may be hellbent on destruction, and a comprehensive approach is needed to successfully govern the protection of critical infrastructure, specialists say.

Cybersecurity

What CISA Wants Critical Infrastructure Partners to Report on Cyber Incidents

A new guide provides clues into how the agency might be thinking of crucial details, such as what should count as an “incident” under a new law.

Cybersecurity

Joint Alert Warns Advanced Hackers Have Developed Tool Targeting Industrial Control Systems

The design of the tool, which allows full system access to certain operational technology in environments such as power plants and water treatment facilities, can also be used by less sophisticated attackers.

Cybersecurity

Private Sector Player Urges DOD to Screen 5G Technology for Cybersecurity

The Pentagon is offering cash prizes for hardware or software ideas to make various components of fifth-generation networking technology interoperable across various manufacturers.

Cybersecurity

DOJ Disrupts Botnet Run by Russian State-Backed Hacking Group Sandworm

A slew of federal officials from the U.S. and U.K. removed malware from among thousands of infected devices, disrupting a global botnet.

Cybersecurity

Key Lawmaker Defends SEC’s Cyber Incident Reporting Proposal 

Rep. Jim Langevin was responding to an industry assertion that the SEC proposal undercuts the will of Congress, given recently enacted legislation.

Cybersecurity

Treasury Wants to Know How the Government Might Grow Cyber Insurance Market

The department is in a bit of an awkward position, tasked with supporting the industry while cautioning against ransomware payouts.

Cybersecurity

Lawmakers Move to Protect Healthcare Infrastructure from Potential Russian Threat

The Healthcare Cybersecurity Act works to protect sensitive health care data and information from hackers. 

Cybersecurity

U.S. Law Enforcement Charges Russian Nationals In Global Energy Hacking Scheme

Four Russian government employees were indicted with charges of hacking, illegally obtaining information on computer systems and wire fraud, among others.