/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@cisagov

@cisagov
32 posts
2025-09-26
🚨NEW: we issued Emergency Directive 25-03 to address critical vulnerabilities found in Cisco Adaptive Security Appliances & Cisco Firepower Threat Defense devices. Federal agencies must act now, and we urge all orgs to follow the recommended actions: https://go.dhs.gov/iAK [image]
2025-09-26 View on X
BleepingComputer

CISA issues an emergency directive ordering US federal agencies to secure their Cisco firewall devices against two flaws exploited in zero-day attacks

CISA has issued a new emergency directive ordering U.S. federal agencies to secure their Cisco firewall devices against two flaws that have been exploited in zero-day attacks.

2024-10-26
Today, with @FBI, we released a joint statement on malicious PRC-sponsored cyber activity targeting commercial telecommunications infrastructure. We encourage any organization that believes it might be a victim to engage its local FBI field office or CISA. https://www.cisa.gov/... [image]
2024-10-26 View on X
New York Times

Sources: Chinese hackers targeted data from phones of Trump and JD Vance, via a hack of Verizon systems; staff members of Harris' campaign were also targeted

our adversaries fear him. https://www.wsj.com/... Meridith McGraw / @meridithmcgraw : Chinese hackers are believed to have targeted the cell phones of Trump and Vance, according to...

2024-08-20
Today, we released a joint statement with our partners at @FBI & @ODNIgov about Iran's attempt to undermine confidence in our democratic institutions: https://go.dhs.gov/3Hg [image]
2024-08-20 View on X
Washington Post

The FBI, ODNI, and CISA say they are “confident” that Iran was responsible for recent attempted hacks into the Trump and Biden-Harris presidential campaigns

In a joint statement with intelligence agencies, the bureau said the attempted hacks also were directed at the Democratic campaign.

2024-07-27
In partnership with @FBI and other U.S and international partners, we released a joint advisory on North Korea state-sponsored cyber group #Andariel with details on their global cyber espionage campaign. Read our advisory for mitigations: https://go.dhs.gov/326 [image]
2024-07-27 View on X
Associated Press

The US DOJ indicts a North Korean hacker, still at large, for his alleged role in the Andariel group's cyberattacks on US hospitals, NASA, and military bases

Associated Press :

2024-05-05
Earlier this year the CSRB recommended actions that @Microsoft should take to mitigate risk following a MS Online Exchange intrusion. We commend today's updates & look forward to working with Microsoft to advance towards a more secure future! https://www.theverge.com/...
2024-05-05 View on X
The Verge

Microsoft outlines security principles and goals tied to executive compensation packages, following a scathing US Cyber Safety Review Board report in April 2024

expanding Microsoft's Secure Future Initiative Tom Krazit / Runtime : Microsoft wants to be judged on security Nick Heer / Pixel Envy : Microsoft Says It Is Prioritizing Security A...

2024-05-04
Earlier this year the CSRB recommended actions that @Microsoft should take to mitigate risk following a MS Online Exchange intrusion. We commend today's updates & look forward to working with Microsoft to advance towards a more secure future! https://www.theverge.com/...
2024-05-04 View on X
The Verge

Microsoft outlines security principles and goals tied to executive compensation packages, following a scathing US Cyber Safety Review Board report in April 2024

expanding Microsoft's Secure Future Initiative Tom Warren / The Verge : Read Satya Nadella's Microsoft memo on putting security first Tom Krazit / Runtime : Microsoft wants to be j...

2024-04-03
Today the Cyber Safety Review Board released its independent review of the Summer 2023 Microsoft Exchange Online intrusion laying out what led to the intrusion & what industry & gov't can do to ensure an intrusion at this magnitude does not happen again. https://go.dhs.gov/JRT [image]
2024-04-03 View on X
Washington Post

The US Cyber Safety Review Board faults Microsoft for a “cascade of avoidable errors” that led to the 2023 Chinese hack of top US government officials' emails

The independent Cyber Safety Review Board's forthcoming report knocks the tech giant for shoddy cybersecurity practices …

2024-02-08
Along with @NSACyber, @FBI, @ENERGY, @EPA, @TSA, @CyberGovAU, @cybercentre_ca, @NCSC & NCSC-NZ, we published an advisory on how to protect against cyber threats from People's Republic of China (PRC) state-sponsored cyber actor #VoltTyphoon 👉 https://go.dhs.gov/JxV [image]
2024-02-08 View on X
Axios

US, UK, Australia, Canada, and New Zealand advisory: China-backed hacking group Volt Typhoon has had access to some major US infrastructure for over five years

Sam Sabin / Axios :

2023-11-27
🎉Exciting news! We joined forces with @NCSC and 21 international partners to develop the “Guidelines for Secure AI System Development”! This is operational collaboration in action for secure AI in the digital age: https://go.dhs.gov/oVp #AISafety #SecureByDesign [image]
2023-11-27 View on X
Reuters

The US, the UK, and more than a dozen other countries release joint guidelines for AI system development, including creating systems that are “secure by design”

The United States, Britain and more than a dozen other countries on Sunday unveiled what a senior U.S. official described …

2023-02-09
🚨We released an ESXiArgs ransomware recovery script on GitHub to allow organizations to attempt recovery of virtual machines affected by the ESXiArgs ransomware attacks: https://github.com/... #StopRansomware
2023-02-09 View on X
The Record

The CISA publishes a recovery script for the ESXiArgs ransomware that encrypted files at 3,800+ organizations across the US, France, Italy, and other countries

The Cybersecurity and Infrastructure Security Agency has published a process for recovering files for organizations affected …

2022-07-19
We are opening our first Attaché Office in London this month! This office will work directly with foreign governments, international & multilateral organizations, & @USAinUK counterparts to advance our collaboration on shared goals. https://www.cisa.gov/... 🇺🇸 🇬🇧 https://twitter.com/...
2022-07-19 View on X
The Record

The CISA announces its first international Attaché Office, which it plans to open in London later in July 2022, for collaboration between CISA and UK officials

Martin Matishak / The Record :

2022-04-14
With @DOE_CESER, @FBI, & @NSACyber, we published a joint advisory on APT cyber tools targeting #ICS & #SCADA devices. Critical infrastructure organizations - especially in the energy sector - should review our recommended proactive mitigations and actions: https://www.cisa.gov/... https://twitter.com/...
2022-04-14 View on X
The Record

US government agencies warn of new custom tools, created by several APT actors, that are capable of compromising IT equipment used in critical infrastructure

Several advanced persistent threat (APT) actors have created custom-made tools designed to breach IT equipment used … Source: CISA .

2022-03-26
With the @FBI and @DOE_CESER, we issued an advisory on energy sector facility intrusions from 2011-2018: https://us-cert.gov/... This historical info highlights the need to go Shields Up against this & other potential Russian state-sponsored activity: https://cisa.gov/... https://twitter.com/...
2022-03-26 View on X
New York Times

The DOJ charges four Russian officials for alleged hacking campaigns from 2012 to 2018 on critical US infrastructure, including a Kansas nuclear power plant

Saturday, March 26, 2022 // (IG): BB //Weekly Sponsor: DiyGarage SoCal Gary Warner / CyberCrime & Doing Time : Russia's Invasion of Ukraine and CISA/FBI's New Era of Transparency C...

2022-03-25
With the @FBI and @DOE_CESER, we issued an advisory on energy sector facility intrusions from 2011-2018: https://us-cert.gov/... This historical info highlights the need to go Shields Up against this & other potential Russian state-sponsored activity: https://cisa.gov/... https://twitter.com/...
2022-03-25 View on X
New York Times

The DOJ charges four Russian officials for alleged hacking campaigns from 2012 to 2018 on critical US infrastructure, including a Kansas nuclear power plant

The announcement covered hackings from 2012 to 2018, but served as yet another warning from the Biden administration of Russia's ability to conduct such operations.

2022-03-16
🛡 Shields Up! Russian state-sponsored actors have exploited default Multi-Factor Authentication (MFA) protocols. Make sure your MFA protocols are configured properly! Read our latest advisory w/@FBI to defend your networks against this attack: https://www.cisa.gov/... https://twitter.com/...
2022-03-16 View on X
BleepingComputer

The FBI and CISA warn that Russian state-sponsored hackers accessed an unnamed NGO's network by exploiting default MFA protocols and the PrintNightmare flaw

The FBI says Russian state-backed hackers gained access to a non-governmental organization (NGO) cloud after enrolling their own device …

This exploit is an example of why organizations need to be extra vigilant & adopt a heightened cybersecurity posture that includes enforcing MFA and reviewing configuration to protect against “fail open” and re-enrollment scenarios.
2022-03-16 View on X
BleepingComputer

The FBI and CISA warn that Russian state-sponsored hackers accessed an unnamed NGO's network by exploiting default MFA protocols and the PrintNightmare flaw

The FBI says Russian state-backed hackers gained access to a non-governmental organization (NGO) cloud after enrolling their own device …

The adversaries gained initial network access through compromised credentials, then exploited default MFA settings to enroll a new device and “PrintNightmare” vulnerability to move laterally into cloud & email accounts, & exfiltrate documents.
2022-03-16 View on X
BleepingComputer

The FBI and CISA warn that Russian state-sponsored hackers accessed an unnamed NGO's network by exploiting default MFA protocols and the PrintNightmare flaw

The FBI says Russian state-backed hackers gained access to a non-governmental organization (NGO) cloud after enrolling their own device …

2022-03-01
A new report from @threatintel gives details about taking down a sophisticated malware. This is great work by @BroadcomSW & shows how the power of partnerships - like the #JCDC - can help raise our collective defense. https://symantec-enterprise- blogs.security.com/...
2022-03-01 View on X
BleepingComputer

Symantec details China-linked backdoor Daxin, a Windows kernel driver that can hijack TCP connections to stealthily connect with command-and-control servers

Security researchers have discovered Daxin, a China-linked stealthy backdoor specifically designed for deployment in hardened corporate networks …

2021-12-16
We're working closely with our public and private sector partners to address a critical vulnerability affecting the Apache log4j #software library. This vulnerability is being widely exploited by threat actors and presents an urgent challenge to patch: https://cisa.gov/... 1/2
2021-12-16 View on X
Wall Street Journal

Microsoft and cybersecurity company Mandiant say state-backed hacking groups linked to China, Iran, North Korea, and Turkey are exploiting the Log4j flaw

some of these groups have been known to target think tanks, academic institutions, and NGOs. Assume compromise and back up your files frequently. https://twitter.com/... Dustin Vol...

2021-12-15
We're working closely with our public and private sector partners to address a critical vulnerability affecting the Apache log4j #software library. This vulnerability is being widely exploited by threat actors and presents an urgent challenge to patch: https://cisa.gov/... 1/2
2021-12-15 View on X
Wall Street Journal

Microsoft and cybersecurity company Mandiant say hacking groups linked to China, Iran, North Korea, and Turkey are exploiting the Log4j flaw

Researchers call it one of the most dire cybersecurity threats to emerge in years and could enable devastating attacks