National Cyber Strategy.

A National Cyber Strategy is a comprehensive plan that outlines a country’s approach to cybersecurity. It typically includes goals and

Read more

2021 Top Routinely Exploited Vulnerabilities

For your situational awareness, keeping your cybersecurity knowledge up to date. Summary This joint Cybersecurity Advisory (CSA) was coauthored by

Read more

Reminder for Critical Infrastructure to Stay Vigilant Against Threats During Holidays and Weekends

Original release date: November 22, 2021 As Americans prepare to hit the highways and airports this Thanksgiving holiday, CISA and

Read more

Ransomware Gangs Are Complaining That Other Crooks Are Stealing Their Ransoms

Cyber criminals using a ransomware-as-a-service scheme have been spotted complaining that the group they rent the malware from could be

Read more

How to Prevent Corporate Data Leaks in the Cloud

Forget shadowy attackers deploying bespoke zero-day exploits from afar. A risk that is far more real for organizations as they

Read more

New Malware Uses Windows Subsystem for Linux for Stealthy Attacks

Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that hackers are trying

Read more

Cyber-Intrusion Campaigns Targeting ICS

For your situational awareness. Protecting our Nation’s critical infrastructure is the responsibility of federal and state, local, tribal, and territorial

Read more

CISA-FBI Guidance for MSPs and their Customers Affected by the Kaseya VSA Supply-Chain Ransomware Attack

CISA and the Federal Bureau of Investigation (FBI) continue to respond to the recent supply-chain ransomware attack leveraging a vulnerability

Read more

CISA’s CSET Tool Sets Sights on Ransomware Threat

CISA has released a new module in its Cyber Security Evaluation Tool (CSET): the Ransomware Readiness Assessment (RRA). CSET is

Read more

Attackers Exploit Poor Cyber Hygiene to Compromise Cloud Security Environments

CISA is aware of several recent successful cyberattacks against various organizations’ cloud services. Threat actors used a variety of tactics

Read more