CISA Emergency Directive Orders Mitigations After Microsoft Breach
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are
CISA has laid out the proposed details of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA).
Welcome back to Source Code, Decipher’s weekly news wrap podcast.
The Budworm espionage group leveraged the Log4j flaw to target a number of high-value organizations worldwide, including an unnamed U.S.-based state legislature.
David Agranovich, director of threat disruption with Meta, discusses how threat groups are evolving their targeting of social media platforms in malware and espionage campaigns.
Meanwhile, two exploited Exchange flaws that publicly emerged two weeks ago were not addressed in Microsoft’s update.
Researchers said a new phishing-as-a-service platform features an entirely open registration process that makes it easier for cybercriminals to leverage.