The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released two joint cybersecurity advisories on widespread advanced persistent threat (APT) activity.
Joint Cybersecurity Advisory: AA20-296A Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets
Joint Cybersecurity Advisory: AA20-296B Iranian State-Sponsored Advanced Persistent Threat Actors Threaten Election-Related Systems
Digital Shadows released its quarterly research report focusing on the latest trends in ransomware. Unfortunately, for vulnerable organizations everywhere, Digital Shadows Photon Research team found that ransomware as a market and community on the dark web has expanded since Q2.
During a press conference on election security at FBI Headquarters with FBI Director Christopher Wray, Director of National Intelligence John Ratcliffe confirmed that some voter registration information has been obtained by Iran, and separately, by Russia.
The National Association of Regulatory Utility Commissioners Center for Partnerships and Innovation today announced the release of a series of Smart Grid Interoperability Learning Modules.
U.S. Department of Homeland Security (DHS) Acting Secretary Chad Wolf announced Tuesday the opening of the DHS Center for Countering Human Trafficking, the U.S. government’s first-ever integrated law enforcement operations center directly supporting federal criminal investigations, victim assistance efforts, intelligence analysis, and outreach and training activities related to human trafficking and forced labor.
A new global study by the Economist Intelligence Unit and TransUnion has overwhelmingly found the key to whether or not companies go out of business hinges on providing consumers friction-right digital transactions. Nearly 85% of global executives surveyed as part of the study said they believe smooth digital transactions are “essential to business survival” rather than merely a competitive edge.
There are few discussions in the physical security business that don’t at some point focus on the topic of cybersecurity. One area frequently missing from these conversations is the importance of a trusted supply chain for manufacturers. Since a product is only as good as the hardware and software inside it, examining how something is built can give us rapid insight into its potential vulnerabilities and overall cyber worthiness. The NDAA (National Defense Authorization Act) ban is particularly focused on the subject of component sourcing for security devices. What is inside that device that could be exploited? Where did it come from? What do we know about the manufacturing process? These are all important questions about the manufacturing supply chain that need to be considered by anyone who cares about cybersecurity.
FairWarning announced the results of its Benefits, Attributes and Habits of Mature Privacy and Data Protection Program Report, in partnership with the International Association of Privacy Professionals (IAPP).
According to the Center for Internet Security (CIS), in September 2020, three malware returned to the Top 10: CoinMiner, CryptoWall, and Emotet. The Top 10 Malware variants composed 87% of Total Malware activity in September 2020, up from 78% in August 2020.
Authentic8 released the results of its 2020 Global Financial Crimes Survey, conducted in partnership with the Association of Certified Financial Crime Specialists (ACFCS).