Credit to Author: Christopher Boyd| Date: Thu, 19 May 2022 11:58:06 +0000
A joint multi-national cybersecurity advisory has revealed the top ten attack vectors most exploited by cybercriminals in order to gain access to organisation networks.
Credit to Author: Pieter Arntz| Date: Thu, 12 May 2022 13:22:00 +0000
CISA and the FBI are sharing information about the US attribution of cyberattacks on SATCOM networks that targeted Ukraine but spilled over into other European countries.
Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual “smash and grab” attacks we’ve seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics are putting some of the world’s biggest corporations on edge.
CISA has advised users to take certain vulnerable D-Link routers offline since the existing vulnerabilities are know to be actively exploited and the models have reached EOL and will not get patched.
Credit to Author: Pieter Arntz| Date: Tue, 29 Mar 2022 10:27:03 +0000
Satellites have become a main link in communications, and given some recent events it has become clear why we consider them to be critical infrastructure.