Top 30 most exploited software vulnerabilities being used today

For all the zero-days, custom-crafted malware and other completely unknown security vulnerabilities, others have been around for years and are widely used across the board. To showcase this, the FBI…

Suspected Chinese hackers masqueraded as Indian government to send COVID-19 phishing emails

Written by Tim Starks Oct 5, 2021 | CYBERSCOOP An increasingly active Chinese government-linked hacking group impersonated Indian government agencies with phishing lures related to COVID-19 statistics and tax legislation,…

North Korea targeted cybersecurity researchers using a blend of hacking and espionage

Padlokr –  Padlokr –  North Korea has a long history of hacking targets in the U.S. Chris Price/Flickr, CC BY-ND Paulo Shakarian, Arizona State University North Korean hackers have staged…

'Almost every nation' now has cyber vulnerability exploitation program, NSA official says

Written by Tim Starks Sep 29, 2021 | CYBERSCOOP Nearly every country on the planet now has a program to exploit digital vulnerabilities, a top National Security Agency cyber official…

Malware analysis: Ragnarok ransomware

Ragnarok is recent ransomware used in targeted attacks against unpatched Citrix ADC servers vulnerable to the CVE-2019-19781 vulnerability. This article will analyze the details of this ransomware, how it works…

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Padlokr –  Padlokr –  The FBI’s latest cybersecurity moves bring the government into new territory – inside privately owned computers. AP Photo/Cliff Owen Scott Shackelford, Indiana University The FBI has…

Snort demo: Finding SolarWinds Sunburst indicators of compromise

Introduction to SolarWinds and Sunburst The SolarWinds hack is one of the biggest security incidents of recent years. After cyberthreat actors gained access to SolarWinds’ network, they implanted a backdoor…

Memory forensics demo: SolarWinds breach and Sunburst malware

The SolarWinds hack is one of the biggest cybersecurity incidents in recent years. By gaining access to SolarWinds’ network, attackers were able to access the company’s development environment and implant…

Identifying UNC2452-Related Techniques for ATT&CK

Matt MaloneDec 22, 2020 · 4 min read By Matt Malone (MITRE), Jamie Williams (MITRE), Jen Burns (MITRE), and Adam Pennington (MITRE) Last updated 19 April 2021 12:00pm EDT Reporting…

Top 8 cybersecurity books for incident responders in 2020

Introduction Are you passionate about incident response? Do you want to build upon your knowledge of how to mitigate cyberthreats? If yes, then you’d love the nuggets of wisdom these…