Cybersecurity Blog
New Tech, Personnel Will Help CISA with Coming Rush of Cyber Incident Reports
The CISA is working to comply with the Cyber Incident Reporting for Critical Infrastructure Act of 2022, requiring ...
New NSA AI-powered Tool Would Help Industry Optimize Cyber Defense Testing
The Autonomous Penetration Testing platform would replace much of the laborious, manual process of such testing, where ...
Threat Actor Abuses Trial Feature for Cloudflare Tunnels to Deliver RATs
Hackers are exploiting the free TryCloudflare service to distribute remote access trojans (RATs) like AsyncRAT, ...
Critical Infrastructure Group Launches Effort to Aid Federal Agencies’ Cyber Defenses
The Center for Federal Civilian Executive Branch Resilience, launched by the Institute for Critical Infrastructure ...
Increased Botnet Activity Against Apache OFBiz Exploiting CVE-2024-32113
The open-source ERP framework OFBiz is being targeted by the Mirai botnet due to a critical directory traversal ...
Fighting Ursa Luring Targets With Car for Sale
APT28, a Russia-linked threat actor (also known as Fighting Ursa, Fancy Bear, and Sofacy), has been identified in a ...
Newly Identified BITSLOTH Backdoor Uses Novel C2 Communication Channel
A new Windows backdoor named BITSLOTH has been discovered by cybersecurity researchers. This malware exploits the ...
FBI Warns of Scammers Posing as Crypto Exchange Employees
These fraudsters contact victims through phone calls or messages, posing as representatives of legitimate crypto ...