Government

2025 is going to be a bumpy year for IoT

2025 is going to be a bumpy year for IoT 2024-12-24 at 08:18 By Help Net Security In the Internet of Things (IoT) sector, 2025 is shaping up to be a politically charged year. Major global jurisdictions are set to implement device security regulations, coinciding with potential tariffs, shifting production dynamics, and rising geopolitical tensions. […]

React to this headline:

Loading spinner

2025 is going to be a bumpy year for IoT Read More »

CISA orders federal agencies to secure their Microsoft cloud environments

CISA orders federal agencies to secure their Microsoft cloud environments 2024-12-19 at 15:04 By Zeljka Zorz The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implementing Secure Practices for Cloud Services

React to this headline:

Loading spinner

CISA orders federal agencies to secure their Microsoft cloud environments Read More »

Ukrainian hacker gets prison for infostealer operations

Ukrainian hacker gets prison for infostealer operations 2024-12-19 at 12:03 By Help Net Security Ukrainian national Mark Sokolovsky was sentenced to 60 months in federal prison for one count of conspiracy to commit computer intrusion. According to court documents, he conspired to operate the Raccoon Infostealer as a malware-as-a-service (MaaS). Individuals who deployed Raccoon Infostealer

React to this headline:

Loading spinner

Ukrainian hacker gets prison for infostealer operations Read More »

Resecurity introduces AI-powered GSOC at NATO Edge 2024

Resecurity introduces AI-powered GSOC at NATO Edge 2024 2024-12-06 at 15:03 By Help Net Security Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and Information Agency’s flagship conference. This year’s event, held from December 3 to 5, emphasized emerging technologies in

React to this headline:

Loading spinner

Resecurity introduces AI-powered GSOC at NATO Edge 2024 Read More »

US government, energy sector contractor hit by ransomware

US government, energy sector contractor hit by ransomware 2024-12-03 at 12:15 By Zeljka Zorz ENGlobal, a Texas-based engineering and automation contractor for companies in the energy sector, has had its data encrypted by attackers. “On November 25, 2024, ENGlobal Corporation (the “Company”) became aware of a cybersecurity incident. The preliminary investigation has revealed that a

React to this headline:

Loading spinner

US government, energy sector contractor hit by ransomware Read More »

Lessons from a Honeypot with US Citizens’ Data

Lessons from a Honeypot with US Citizens’ Data 2024-11-13 at 20:15 By Radoslaw Zdonczyk and Nikita Kazymirsky Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work investigating potential risks and threats to the election system, from disinformation campaigns to nation-state actors looking to exploit vulnerabilities. This article is an

React to this headline:

Loading spinner

Lessons from a Honeypot with US Citizens’ Data Read More »

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight 2024-11-13 at 16:03 By In today’s complex cybersecurity landscape, addressing the controls within the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) is critical when seeking to build rapport and work with the Australian Government. Australian cybersecurity regulations like

React to this headline:

Loading spinner

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight Read More »

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard 2024-11-08 at 17:07 By Cybersecurity and operational resilience are paramount for organizations, especially those handling sensitive information. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

CMMC 2.0, CORIE, DORA: Navigating Global Cybersecurity and Resilience Standard Read More »

Russian hackers deliver malicious RDP configuration files to thousands

Russian hackers deliver malicious RDP configuration files to thousands 2024-10-30 at 12:49 By Zeljka Zorz Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is targeting government, academia, defense, and NGO workers with phishing emails containing a signed Remote Desktop Protocol (RDP) configuration file. “Based

React to this headline:

Loading spinner

Russian hackers deliver malicious RDP configuration files to thousands Read More »

IT security and government services: Balancing transparency and security

IT security and government services: Balancing transparency and security 2024-10-22 at 07:33 By Help Net Security Government information technology leaders find themselves at a challenging balance point: On one end of the scale are increasing threats from cyber actors, bolstered by advanced technology like artificial intelligence (AI); on the other end is a longstanding commitment

React to this headline:

Loading spinner

IT security and government services: Balancing transparency and security Read More »

How Threat Actors Conduct Election Interference Operations: An Overview

How Threat Actors Conduct Election Interference Operations: An Overview 2024-10-18 at 21:46 By Pauline Bolaños The major headlines that arose from the three most recent US presidential election cycles illuminated the various fragilities of American election infrastructures and systems. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

How Threat Actors Conduct Election Interference Operations: An Overview Read More »

Combating Misinformation and Cyber Threats to Secure the 2024 US Election

Combating Misinformation and Cyber Threats to Secure the 2024 US Election 2024-10-15 at 16:01 By Karl Sigler As we near the 2024 election, safeguarding the integrity of our democratic process is of paramount importance. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Combating Misinformation and Cyber Threats to Secure the 2024 US Election Read More »

Strengthening Email Security: DOJ Disrupts Russian Spear-Phishing Campaign

Strengthening Email Security: DOJ Disrupts Russian Spear-Phishing Campaign 2024-10-09 at 16:02 By The need for an iron-clad email security solution is once again making headlines. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Strengthening Email Security: DOJ Disrupts Russian Spear-Phishing Campaign Read More »

Protecting the US Election by Adopting Basic Cybersecurity Protocols

Protecting the US Election by Adopting Basic Cybersecurity Protocols 2024-10-04 at 18:31 By In a joint advisory issued on September 18, the Office of the Director of National Intelligence (ODNI), the Federal Bureau of Investigation (FBI), and the Cybersecurity and Infrastructure Security Agency (CISA) reported that Iranian actors have increased their activity attempting to influence the 2024

React to this headline:

Loading spinner

Protecting the US Election by Adopting Basic Cybersecurity Protocols Read More »

US, Allies Release Guidance on Securing OT Environments

US, Allies Release Guidance on Securing OT Environments 2024-10-02 at 17:01 By Ionut Arghire New guidance provides information on how to create and maintain a secure operational technology (OT) environment. The post US, Allies Release Guidance on Securing OT Environments appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

US, Allies Release Guidance on Securing OT Environments Read More »

CMMC 2.0: A Roadmap to Compliance with Trustwave

CMMC 2.0: A Roadmap to Compliance with Trustwave 2024-10-01 at 16:01 By The U.S. Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) 2.0 has passed through the Office of Information and Regulatory Affairs and is now on its way to Congress, set to become law by Q4 2024. With the CMMC becoming official law, its full

React to this headline:

Loading spinner

CMMC 2.0: A Roadmap to Compliance with Trustwave Read More »

California Governor Vetoes Bill to Create First-in-Nation AI Safety Measures

California Governor Vetoes Bill to Create First-in-Nation AI Safety Measures 2024-09-30 at 06:16 By Associated Press Gavin Newsom vetoed a landmark bill SB 1047 aimed at establishing first-in-the-nation safety measures for large artificial intelligence models. The post California Governor Vetoes Bill to Create First-in-Nation AI Safety Measures appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

California Governor Vetoes Bill to Create First-in-Nation AI Safety Measures Read More »

2024 Election Threats: Misinformation, Deepfakes, and Cybersecurity

2024 Election Threats: Misinformation, Deepfakes, and Cybersecurity 2024-09-27 at 16:01 By Karl Sigler As the intensity of a critical election year builds, the greatest threat isn’t necessarily the security of ballot machines. Instead, it lies in misinformation, amplified by social media, biased algorithms, and the spread of fake news. During the 2020 U.S. presidential election,

React to this headline:

Loading spinner

2024 Election Threats: Misinformation, Deepfakes, and Cybersecurity Read More »

PoC for critical SolarWinds Web Help Desk vulnerability released (CVE-2024-28987)

PoC for critical SolarWinds Web Help Desk vulnerability released (CVE-2024-28987) 2024-09-25 at 17:17 By Zeljka Zorz Details about and proof-of-concept (PoC) exploit code for CVE-2024-28987, a recently patched SolarWinds Web Help Desk (WHD) vulnerability that could be exploited by unauthenticated attackers to remotely read and modify all help desk ticket details, are now public. “When

React to this headline:

Loading spinner

PoC for critical SolarWinds Web Help Desk vulnerability released (CVE-2024-28987) Read More »

Shedding Light on Election Deepfakes

Shedding Light on Election Deepfakes 2024-09-25 at 16:01 By Pauline Bolaños Contrary to popular belief, deepfakes — AI-crafted audio files, images, or videos that depict events and statements that never occurred; a portmanteau of “deep learning” and “fake” — are not all intrinsically malicious.  This article is an excerpt from SpiderLabs Blog View Original Source React to

React to this headline:

Loading spinner

Shedding Light on Election Deepfakes Read More »

Scroll to Top