A proposed rule from a trio of federal financial regulatory agencies aims to change current reporting requirements so that financial service organizations have to notify federal regulators of a security incident within 36 hours.
The latest Intel vPro processor will include built-in protections to detect and block ransomware attacks, Intel said.
Discussions on developing norms for cyber operations have resurfaced in the wake of the SolarWinds breach and subsequent intrusions, but experts say it's not a simple task.
From a vulnerability management perspective, it makes sense for defenders to be aware of which vulnerabilities have publicly available exploit code. Increasingly, much of that code is beginning to appear on GitHub.
CISA has found several initial access vectors used by the SolarWinds attackers, including abusing legitimate accounts and forging SAML tokens.
The number of SolarWinds Orion servers online is rising in the past week, possibly a result of misconfigurations as customers work to patch after the breach.
Citrix has released software mitigations to help prevent DDoS attacks using its ADC and Gateway appliances.
The SolarWinds attackers had access to some Microsoft source code repositories, but did not have the ability to change them, the company said.
Linux creator Linus Torvalds prefers AMD processors because of the chip company's unofficial support for ECC memory, something Intel has chosen not to offer for its non-server processors.
The Emotet malware has begun spreading again after one of its periodic breaks, using Christmas and COVID lures.
A group of security and technology vendors, non-profit groups, and other organizations have formed a coalition to tackle the impact of ransomware on various industry sectors such as government, education, healthcare, and other critical verticals. The Ransomware Task Force will release a standard framework addressing how to deal with attacks.
Attackers have increasingly targeted the software supply chain by populating package managers such as RubyGems and npm with malicious code.
The editors of Decipher have put together a list of books, technical and otherwise, you can enjoy during a well-deserved holiday break.
CISA said the attackers behind the SolarWinds compromise used other infection vectors to access some victims' networks.
Some news for security operations teams investigating their networks for signs that nation-state attackers had deployed the Sunburst malware via the SolarWinds' Orion network monitoring technology: FireEye has identified a killswitch that would stop the malware from executing in infected networks.