Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the highly sophisticated Russian adversary Sandworm during various destructive activities against targets in Ukraine and other countries in the ...

Emulating the Notorious Chinese State-Sponsored Winnti Group

AttackIQ has released three new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the stealthy and notorious Winnti Group during its activities in ...
healthcare voice scams

Cybersecurity Automation in Healthcare Program Launched by HHS Agency

The UPGRADE program seeks to enhance and automate cybersecurity for healthcare facilities, focused on protecting operations and ensuring continuity of patient care ...
Security Boulevard
filling out a job resume

White House Cybersecurity Workforce Initiative Backed by Tech Titans

No degree? No problem. The federal government and private industry leaders are coordinating to prioritize skills-based hiring to shore up the nation's cybersecurity workforce ...
Security Boulevard
Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack

Zero-Day Nightmare: Palo Alto, Cisco, and MITRE Under Attack

Zero-day threats continue to wreak havoc on organizations worldwide, with recent attacks targeting corporate and government networks. In the last few weeks, government-sponsored threat actors have targeted Palo Alto Networks and Cisco ...
electric wires

Oak Ridge, McCrary Institute Establish Cybersecurity Center Focused on Electrical Grid

In addition to supporting research centers, the $12.5 million project focuses on training the next generation of cybersecurity pros to safeguard the nation's critical infrastructure.  ...
Security Boulevard

Linux Backdoor Infection Scare, Massive Social Security Number Heist

In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...
FCC connected cars domestic abuse

FCC Mulls Rules to Protect Abuse Survivors from Stalking Through Cars

To protect domestic violence survivors from abusers, the FCC wants to include internet-connected vehicles under the Safe Communication Act ...
Security Boulevard
NETSCOUT cybersecurity, attacks resources security challenges tools breach API attacker Radware Report Sees Major Spike in DDoS Attacks

CISA Unveils Critical Infrastructure Reporting Rule

The Cybersecurity and Infrastructure Security Agency (CISA) issued a Notice of Proposed Rulemaking (NPRM) for the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) of 2022. Under this rule, covered entities must ...
Security Boulevard
Cyber readiness and SBOMs

Cyber readiness and SBOMs

The Advanced Technology Academic Research Center (ATARC) recently hosted the webinar "Unlocking Cyber Readiness with SBOMs," focusing on the essential role of software bills of materials (SBOMs) in enhancing cybersecurity frameworks across ...