CISA Emergency Directive Orders Mitigations After Microsoft Breach
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are
CISA has laid out the proposed details of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA).
Cybercriminals have rewritten the Buer malware loader in the Rust programming language, in an attempt to avoid detection.
Researchers shed light on the FiveHands ransomware, which was deployed after a threat group exploited a now-patched SonicWall flaw in January.
A ransomware task force has proposed a variety of technical, policy, and regulatory means for disrupting ransomware, including tracking Bitcoin transactions more closely and mandating ransom payment disclosures.
A threat campaign is relying on cross-site scripting attacks to deliver malware to and steal credentials from online shops.
The Ghostwriter influence campaign has expanded its targeting and TTPs, with researchers linking parts of it to the UNC1151 threat group.