Remove vulnerabilities-threats dhs-shares-data-on-top-cyber-threats-to-federal-agencies
article thumbnail

Russia’s Invasion of Ukraine and CISA/FBI’s New Era of Transparency

Security Boulevard

I want to start this post with the most important thing right up top: The CISA.gov/Shields-Up page starts with this statement. PLEASE take it seriously, and escalate to your top management: "Russia’s invasion of Ukraine could impact organizations both within and beyond the region, to include malicious cyber activity against the U.S.

article thumbnail

Understanding the Difference Between Vulnerabilities and Exposures

NopSec

The cybersecurity world talks a lot about “ common vulnerabilities and exposures ” (CVEs) and compiles ongoing lists of them with a CVE numbering system. Effective risk management involves understanding and tracking this list and taking precautionary measures against cyber threats as a result. What is a Vulnerability?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Steve Luczynski and Matt Mayes join The Hacker Mind to talk about the importance of getting hackers, vendors, and the government to get together and work through problems. “We wanted to show that this attack is has serious consequences for this vehicle.” Could we hack into an airplane, for example.

Hacking 52
article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

Related: DHS embarks on 60-day cybersecurity sprints. In response, President Biden last week issued an executive order requiring more rigorous cybersecurity practices for federal agencies and contractors that develop software for the federal government. The attackers shut down the largest fuel pipeline in the U.S.,

Hacking 205
article thumbnail

MY TAKE: US cyber adversaries take cue from shutdown to accelerate malware deployment

The Last Watchdog

One profound consequence of Donald Trump’s shutdown of the federal government, now in day 33, is what a boon it is to US cyber adversaries. Related: Welcome to the ‘golden age’ of cyber espionage. And moving forward, the long run ramifications are likely to be dire, indeed.

Malware 145
article thumbnail

ROUNDTABLE: Mayorkas’ 60-day cybersecurity sprints win support; also a prove-it-to-me response

The Last Watchdog

The Biden Administration is wasting no time fully re-engaging the federal government in cybersecurity. Related: Supply-chains become top targets. Mayorkas has been championing an extensive portfolio of initiatives to rally public-private collaboration to fend off cyber criminals and state-sponsored threat actors.

article thumbnail

ROUNDTABLE: CISA’s prominent role sharing threat intel could get choked off this weekend

The Last Watchdog

Related: Biden’s cybersecurity strategy As this political theater runs its course one of the many things at risk is national security, particularly on the cyber warfare front. ” This plan contrasts with most other DHS sectors, where employees like airport screeners and FEMA staff will continue their duties during the shutdown.