Categorie
Cyber Security

NSA, CISA List Expectations for Industry on Data Governance in 5G Environments (Mariam Baksh, Nextgov)

Federal cybersecurity agencies are continuing to demarcate security roles for stakeholders in fifth-generation networking architectures with the release of guidance on the appropriate management of data in the cloud-based systems.

“Data is an incredibly valuable resource driving every industry in the modern world,” Bob Kolasky, who leads Cybersecurity and Infrastructure Security Agency’s National Risk Management Center, said in a press release Thursday. “This makes it an especially attractive target for adversaries. This paper highlights the importance of government and industry coordination in addressing the complex task of protecting our critical data. As with the previous two parts of this series, CISA encourages the 5G community to review this guidance and take actionable steps to help strengthen the nation’s 5G cloud infrastructure.”

NSA, CISA List Expectations for Industry on Data Governance in 5G Environments – Nextgov

Categorie
Cyber Security USA

Why Government Suppliers Will Struggle to Meet CMMC Requirements (Matt Malarkey, Nextgov)

The SolarWinds cyberattack was unprecedented in both scope and scale. The sophisticated breach saw hackers bake their exploit into a trusted software update pushed out to SolarWinds clients, including federal government agencies. This resulted in the exposure of sensitive data and highlighted how the U.S. government’s cybersecurity is only as strong as the posture of its contractors and suppliers.

Why Government Suppliers Will Struggle to Meet CMMC Requirements  – Nextgov

Categorie
Cyber Security

NSO Group spyware used to compromise iPhones of 9 US State Dept officials (Pierluigi Paganini, Security Affairs)

The iPhones of at least nine US state department officials were compromised with the NSO Group’s spyware Pegasus.

NSO Group spyware used to compromise iPhones of 9 US officials

Categorie
Cyber Security

KAX17 threat actor is attempting to deanonymize Tor users running thousands of rogue relays (Pierluigi Paganini, Security Affairs)

A mysterious threat actor, tracked as KAX17, has run thousands of malicious Tor relay servers since 2017 in an attempt to deanonymize Tor users.

KAX17 threat actor is attempting to deanonymize Tor users running thousands of rogue relaysSecurity Affairs

Categorie
Cyber Security

Threat actors stole $120 M in crypto from BadgerDAO DeFi platform (Pierluigi Paganini, Security Affairs)

Threat actors this week have hacked the decentralized finance platform BadgerDAO and have stolen $120.3 million in crypto funds, blockchain security firm PeckShield reported. Most of the stolen funds, over $117 million, were Bitcoin, while the rest of the stolen assets were stored in the form of interest-bearing Bitcoin, a form of tokenised Bitcoin, and Ether.

Threat actors stole $120 M in crypto from BadgerDAO DeFi platformSecurity Affairs

Categorie
Cyber Security

Watch out for Omicron COVID-19-themed phishing messages! (Pierluigi Paganini, Security Affairs)

Crooks have already started exploiting the interest in the Omicron COVID-19 variant and are using it as a lure in phishing attacks.

Watch out for Omicron COVID-19-themed phishing messages!Security Affairs

Categorie
Cyber Security

CISA adds Zoho, Apache, Qualcomm, Mikrotik flaws to the list of actively exploited issues (Pierluigi Paganini, Security Affairs)

U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its catalog of actively exploited vulnerabilities recommending federal agencies to address the flaws in Qualcomm, Mikrotik, Zoho and the Apache Software Foundation software within specific timeframes and deadlines.

CISA adds Zoho, Apache, Qualcomm, Mikrotik flaws to the list of actively exploited issuesSecurity Affairs

Categorie
Cyber Security

Russian internet watchdog Roskomnadzor bans six more VPN services (Pierluigi Paganini, Security Affairs)

Russian communications watchdog Roskomnadzor tightens the control over the Internet and blocked access to six more VPN services. The latest banned services are Betternet, Lantern, X-VPN, Cloudflare WARP, Tachyon VPN, PrivateTunnel.

Russian internet watchdog Roskomnadzor bans six more VPN servicesSecurity Affairs

Categorie
Cyber Security

Europol arrested 1800 money mules as part of an anti-money-laundering operation (Pierluigi Paganini, Security Affairs)

Europol has identified 18,351 money mules and arrested 1,803 of them as part of an international anti-money-laundering operation codenamed EMMA 7.

The operation is the result of a joint effort of 27 countries, Eurojust, INTERPOL, the European Banking Federation (EBF), and the FinTech FinCrime Exchange

The name EMMA is an acronym for European Money Mule Action operation, the first EMMA operation led by Europol took place in 2016.

Europol arrested 1800 money mules as part of anti-money-laundering operationSecurity Affairs

Page 1 of 11
1 2 3 11