CISA has released guidance for the telecommunications sector in preparation for Typhoon Salt.

US officials are concerned about the extent of China-backed Salt Typhoon’s intrusions into US telecom networks. The Cybersecurity and Infrastructure Security Agency, NSA, and FBI have issued guidance to address the threat, with victims like Verizon, AT&T, and Lumen still working to eradicate the threat actor. The attacks have resulted in theft of call detail … Read more

The Internet Archive has successfully restored most of its service after being targeted in a string of cyberattacks.

The Internet Archive has recovered from a series of cyberattacks last month, with most of its main sites and services back up and running. Apple is offering up to $1 million for hacking into its servers. The attacks involved a data breach, a DDoS attack, and the theft of GitLab authentication tokens. The Internet Archive … Read more

The increasing cyber insecurity is now affecting the health and well-being of Americans. A more effective treatment plan is urgently needed.

The health care sector is facing an increasing number of cyberattacks, with hospitals and insurers falling victim to hackers. Proactive steps must be taken to ensure cybersecurity in the healthcare industry, including accountability for implementing best practices, accessibility to cybersecurity services, and collaboration between the public and private sectors. Legislation such as the Cyber Incident … Read more

Attention security professionals: It is crucial that you take action and engage in the upcoming election on a local level. Your expertise and insights can make a significant impact on the safety and security of your community. Make sure your voice is heard and get involved in shaping the future of your city or town. Together, we can make a difference.

Cybersecurity professionals and leaders play a crucial role in defending the integrity of elections by addressing challenges such as AI-generated disinformation and threats against election officials. By engaging in open conversations, educating the public about security measures, and participating in the democratic process, cybersecurity experts can help rebuild public trust in elections. Recommendations include independent … Read more

Enhanced security features in the latest version of Cisco ASA and FTD now block VPN brute-force password attacks.

Cisco has added new security features to mitigate brute-force and password spray attacks on Cisco ASA and Firepower Threat Defense devices. These attacks were recently targeting VPN accounts on various networking devices. The new features help detect and block such attacks, reducing the impact on devices. Admins must enable these features on supported software versions … Read more

TeamTNT, a well-known hacking group, has recently initiated a series of cloud-based attacks focused on cryptocurrency mining.

TeamTNT, a cryptojacking group, is preparing for a large-scale campaign targeting cloud-native environments for mining cryptocurrencies. They are using Docker daemons to deploy malware and cryptominers, as well as renting out breached servers for illicit cryptocurrency mining. The attacks involve identifying exposed Docker API endpoints, deploying malicious containers, and using the Sliver C2 framework for … Read more

The Chaos of Mobile Ad Data Surveillance on a Global Scale – Krebs on Security

A lawsuit in New Jersey highlights how commercial services can track individuals by their mobile devices, leading to privacy violations and potential dangers. The lawsuit involves law enforcement officers targeted by data brokers ignoring privacy laws. Companies like Babel Street can track individuals using their Mobile Advertising ID, building sophisticated spying apparatuses using location data … Read more

Enroll in our ISC2 CISSP® Certification Boot Camp and secure your certification with our guaranteed success rate!

Mastering the CISSP domains in the ISC2 CISSP Common Body of Knowledge prepares individuals for a well-rounded understanding of cybersecurity. The exam covers eight domains including security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. After obtaining the … Read more

Google warns that a zero-day vulnerability in Samsung devices is actively being exploited by malicious actors.

A zero-day vulnerability, tracked as CVE-2024-44068, was found in Samsung’s mobile processors allowing for arbitrary code execution. The critical bug was patched in Samsung’s October security updates and affects Exynos 9820, 9825, 980, 990, 850, and W920 processors. Google researcher Xingyu Jin reported the flaw, with an exploit chain discovered in the wild by Google … Read more

The breach of The Internet Archive remains ongoing

The Internet Archive has been facing cybersecurity troubles, including DDoS attacks, data breach, and defacement. Despite efforts to strengthen their defenses, an email sent via Zendesk revealed that some IT assets remain compromised. The threat actor accessed IA’s source code, user database, and Zendesk system through an exposed GitLab configuration file. However, they did not … Read more