/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@uscert_gov

@uscert_gov
22 posts
2022-07-06
🌐@CISAgov and @DHSgov are working with @NIST to prepare for the launch of a new cryptographic standard to protect against future quantum-based threats. Learn more about this effort and read https://www.cisa.gov/... #Cryptograpy #Cybersecurity #IT #Quantum #Technology
2022-07-06 View on X
SC Media

NIST selects four encryption algorithms designed to withstand future quantum computing hacking threats and underpin its future cryptography standards by 2024

For years, the National Institute for Standards and Technology have been working on a project to identify and vet a handful …

2022-06-24
❗❗ @CISAgov and @USCG Cyber Command released a joint cybersecurity advisory detailing cyber threat actors exploiting a #Log4Shell vulnerability in VMware Horizon® and UAG servers to get access to victim networks. https://www.cisa.gov/... #Cybersecurity #APT #CVE https://twitter.com/...
2022-06-24 View on X
The Record

The CISA and US Coast Guard Cyber Command warn companies of Log4Shell exploits in the wild, citing one incident of threat actors exfiltrating over 130GB of data

The Cybersecurity and Infrastructure Security Agency (CISA) and the United States Coast Guard Cyber Command (CGCYBER) …

2022-01-17
⚠️ @CISAgov recommends network defenders review the Microsoft blog on destructive malware targeting Ukrainian organizations. https://www.cisa.gov/... #Cybersecurity #InfoSec
2022-01-17 View on X
Microsoft Security Blog

Microsoft identifies a destructive malware operation targeting Ukrainian organizations; the malware looks like ransomware but lacks a ransom recovery mechanism

European Union simulated a cyber attack on a fictitious Finnish power company Vilius Petkauskas / cybernews.com : Belarus state hackers suspected behind Ukraine cyberattack Grugq /...

2022-01-13
❗ Be sure to review @CNMF_CyberAlert's latest release on #MuddyWater to protect your networks against #malware and other malicious cyber activity. https://cybercom.mil/... #Cybersecurity #APTs https://twitter.com/...
2022-01-13 View on X
The Record

US Cyber Command says malware group MuddyWater is tied to Iranian intelligence, the first time the US government has publicly linked the threat actor to Tehran

U.S. Cyber Command on Wednesday revealed that a hacking group reputed for its cyberespionage campaigns is actually part of Iran's intelligence apparatus. Source: U.S. Cyber Command...

2021-12-11
Upgrade ASAP to protect yourself from the #RCE vulnerability, CVE-2021-44228, affecting Apache Log4j. Read more at https://www.cisa.gov/... #ZeroDay #Cybersecurity #InfoSec
2021-12-11 View on X
LunaSec Blog

A vulnerability in the Apache log4j Java logging library allows for remote code execution, impacting Steam, iCloud, Minecraft, and other services

A few hours ago, a -day exploit in the popular Java logging library, log4j, was tweeted along with a POC posted on GitHub that results …

2021-10-24
Versions (0.7.29, 0.8.0, and 1.0.0 ) of a popular NPM package named ua-parser-js was found to contain malicious code. Please update to the patched versions (0.7.30, 0.8.1, 1.0.1). More in our alert: https://us-cert.cisa.gov/... GitHub advisory: https://github.com/...
2021-10-24 View on X
The Record

CISA warns of malware discovered in npm package UAParser.js, which has 6M-7M downloads weekly, that installs a password stealer and a crypto miner

A massively popular JavaScript library (npm package) was hacked today and modified with malicious code that downloaded and installed … Source: GitHub , CISA , and GitHub .

2021-07-05
.@CISAgov and @FBI strongly recommend MSPs and #MSP customers affected by the Kaseya VSA supply-chain #ransomware attack take immediate action. See https://us-cert.cisa.gov/... for recommendations. #Cybersecurity #InfoSec #Ransomware
2021-07-05 View on X
The Record

In a post on the REvil dark web blog, the gang takes credit for the Kaseya attack, claims it infected 1M+ systems, and demands $70M in bitcoin for the decryptor

The REvil ransomware gang is asking for a $70 million ransom payment to publish a universal decryptor that can unlock …

.@CISAgov and @FBI strongly recommend MSPs and #MSP customers affected by the Kaseya VSA supply-chain #ransomware attack take immediate action. See https://us-cert.cisa.gov/... for recommendations. #Cybersecurity #InfoSec #Ransomware
2021-07-05 View on X
Reuters

President Biden says he has directed US intelligence agencies to investigate the Kaseya ransomware attack and adds “we're not certain” who is behind the attack

Trevor Hunnicutt / Reuters :

2021-07-04
.@CISAgov is taking action to understand and address the supply-chain #ransomware attack against Kaseya VSA and the multiple #MSPs that employ VSA software. Review the Kaseya advisory and immediately follow their guidance to shutdown VSA servers: https://helpdesk.kaseya.com/ ...
2021-07-04 View on X
BleepingComputer

REvil is pushing ransomware via an update for Kaseya's IT management software, hitting hundreds of managed service providers with thousands of customers

A massive REvil ransomware attack affects multiple managed service providers and their clients through a reported Kaseya supply-chain attack.

2021-07-03
.@CISAgov is taking action to understand and address the supply-chain #ransomware attack against Kaseya VSA and the multiple #MSPs that employ VSA software. Review the Kaseya advisory and immediately follow their guidance to shutdown VSA servers: https://helpdesk.kaseya.com/ ...
2021-07-03 View on X
BleepingComputer

REvil is pushing ransomware via an update for Kaseya's IT management software, hitting eight or more large managed service providers with thousands of customers

A massive REvil ransomware attack affects multiple managed service providers and their clients through a reported Kaseya supply-chain attack.

2021-05-29
Microsoft has released information on a widespread malicious email campaign carried out by a cyber actor they identify as NOBELIUM. See https://us-cert.cisa.gov/... #Cybersecurity #InfoSec
2021-05-29 View on X
New York Times

Microsoft: hackers behind SolarWinds recently breached State Dept. aid agency to send emails with malicious code to 150 orgs, including NGOs critical of Putin

Microsoft reported that it had detected the intrusion and that the same hackers behind the earlier SolarWinds attack were responsible.

2021-05-28
Microsoft has released information on a widespread malicious email campaign carried out by a cyber actor they identify as NOBELIUM. See https://us-cert.cisa.gov/... #Cybersecurity #InfoSec
2021-05-28 View on X
New York Times

Microsoft says SolarWinds hackers seized an email system used by State Department's international aid agency to breach NGOs and organizations critical of Putin

Microsoft reported that it had detected the intrusion and that the same hackers behind the earlier SolarWinds attack were responsible.

2021-04-14
❗ @CISAgov strongly urges organizations apply Microsoft's April Security Update to mitigate against newly disclosed significant vulnerabilities affecting Exchange Servers. See https://us-cert.gov/... for details & new ED 21-02 Supplemental Direction. #Cybersecurity #InfoSec #IT https://twitter.com/...
2021-04-14 View on X
BleepingComputer

In its April batch of patches, Microsoft fixes 108 flaws, including 19 “critical” flaws, five 0-days, and four NSA-discovered critical Exchange flaws

Today is Microsoft's April 2021 Patch Tuesday, and with it comes five zero-day vulnerabilities and more Critical Microsoft Exchange vulnerabilities.

❗ @CISAgov strongly urges organizations apply Microsoft's April Security Update to mitigate against newly disclosed significant vulnerabilities affecting Exchange Servers. See https://us-cert.gov/... for details & new ED 21-02 Supplemental Direction. #Cybersecurity #InfoSec #IT https://twitter.com/...
2021-04-14 View on X
VICE

The DOJ says the FBI performed a court-approved operation to “copy and remove malicious web shells” on hundreds of hacked Exchange servers across the US

The FBI obtained court approval to access vulnerable computers across the United States.  —  Joseph Cox

2020-11-01
❗ @CISAgov and @FBI are aware of an Iranian APT Actor targeting U.S. state websites, including elections websites. Read more at https://us-cert.cisa.gov/... to secure voter registration data ASAP. #Cybersecurity #APT #Infosec #Protect2020 #Elections https://twitter.com/...
2020-11-01 View on X
BleepingComputer

CISA, FBI say an Iran-linked APT targeted unsecured state election websites to harvest US voter info used to send threatening emails to some Democratic voters

Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data Raphael Satter / Reuters : U.S. says Iranian hackers behind threatening emails accessed voter ...

2020-10-31
❗ @CISAgov and @FBI are aware of an Iranian APT Actor targeting U.S. state websites, including elections websites. Read more at https://us-cert.cisa.gov/... to secure voter registration data ASAP. #Cybersecurity #APT #Infosec #Protect2020 #Elections https://twitter.com/...
2020-10-31 View on X
BleepingComputer

CISA, FBI say an Iran-linked APT targeted unsecured state election websites to harvest US voter info used to send threatening emails to some Democratic voters

DHS CISA and the FBI today shared more info on how an Iranian state-sponsored hacking group was able to harvest voter registration info …

2020-09-15
🚨 @CISAgov and @FBI issued an advisory on Chinese Ministry of State Security-affiliated cyber threat activity. Protect your network and information systems by regularly applying the latest security patches & updates. Read more at https://us-cert.cisa.gov/.... #Cybersecurity #InfoSec https://twitter.com/...
2020-09-15 View on X
ZDNet

CISA: hacking groups linked to China's Ministry of State Security have exploited F5, Citrix, Pulse Secure, and Microsoft Exchange bugs to hack US gov't networks

Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity Ravie Lakshmanan / The Hacker News : CISA: Chinese Hackers Exploiting Unpatched Devices to Target U.S. Age...

2020-02-17
See @CISAgov's Malware Analysis Reports at https://us-cert.gov/... for new information on malware used by the North Korean government. #Cyber #Cybersecurity #InfoSec #HIDDENCOBRA
2020-02-17 View on X
Ars Technica

Several US agencies jointly share details on a North Korean hacking campaign, as US-provided attribution for nation state-led cyber attacks becomes more common

Malicious wares are used in attacks to steal money and conduct other illegal activities.  —  The US Pentagon, the FBI …

2020-01-20
Microsoft has released a workaround for an Internet Explorer vulnerability being used in limited targeted attacks. Implement workarounds and apply updates when available. Read more at https://www.us-cert.gov/.... #Cyber #Cybersecurity #InfoSec
2020-01-20 View on X
TechCrunch

Microsoft knows about an actively exploited bug in Internet Explorer on all Windows versions but likely won't have a fix until the next Patch Tuesday on Feb. 11

Zack Whittaker / TechCrunch :

2020-01-19
Microsoft has released a workaround for an Internet Explorer vulnerability being used in limited targeted attacks. Implement workarounds and apply updates when available. Read more at https://www.us-cert.gov/.... #Cyber #Cybersecurity #InfoSec
2020-01-19 View on X
TechCrunch

Microsoft knows about an actively exploited bug in Internet Explorer on all Windows versions, but likely won't have a fix until the next Patch Tuesday on Feb 11

Microsoft has confirmed a security flaw affecting Internet Explorer is currently being used by hackers, but that it has no immediate plans to fix.