Leaked Black Basta Chats Provide Key Cyber Defense Insights
Black Basta's leaked chats offer significant intelligence to cybersecurity experts. Internal conflicts and defections have destabilized the ransomware group. Defenders…
Apple Discontinues Encrypted iCloud Feature in UK
Apple has ceased offering its Advanced Data Protection feature in the United Kingdom, affecting users' ability to secure their iCloud…
Former CISA Employee Misidentified as SSA Acting Head Online
Ross Foard is wrongly identified as SSA's acting head online. Foard clarified his identity through a LinkedIn post. Several media…
Salt Typhoon Breaches Cisco Devices in Telecom Attacks
Salt Typhoon exploited Cisco devices in telecom network attacks. Group used both vulnerabilities and legitimate credentials for access. Cisco advises…
SEC Renames Unit to Target Cyber and Emerging Tech Crimes
SEC renames its cyber unit to broaden oversight. The new unit focuses on various technological frauds. Leadership and expanded mandate…
Russian Groups Exploit Signal to Spy on Ukrainian Officials
Russian threat groups target Signal to access Ukrainian officials' communications. Methods include malicious QR codes and abuse of linked devices.…
Energy CISO Urges Collaboration to Overcome Zero Trust Challenges
Energy Department seeks external help for zero trust challenges. Vendors play a crucial role in overcoming legacy system issues. Effective…
Salt Typhoon Exploits Telecom Breach, Targets Vast US Data
Salt Typhoon targeted US telecoms, compromising vast data. FBI highlights the indiscriminate nature of the breach. Strengthened cybersecurity measures are…
Edge Device Vulnerabilities Drive Major Cyberattacks in 2024
Edge device vulnerabilities were key in major attacks in 2024. Ivanti, Fortinet, and Palo Alto Networks products were frequently exploited.…
Storm-2372 Exploits Device Code Phishing to Access Critical Systems
Storm-2372 conducts device code phishing targeting critical infrastructure. They exploit authentication tokens for unauthorized data access and movement. Enhanced cybersecurity…