2021 Top Routinely Exploited Vulnerabilities

For your situational awareness, keeping your cybersecurity knowledge up to date. Summary This joint Cybersecurity Advisory (CSA) was coauthored by

Read more

Reminder for Critical Infrastructure to Stay Vigilant Against Threats During Holidays and Weekends

Original release date: November 22, 2021 As Americans prepare to hit the highways and airports this Thanksgiving holiday, CISA and

Read more

Ransomware Gangs Are Complaining That Other Crooks Are Stealing Their Ransoms

Cyber criminals using a ransomware-as-a-service scheme have been spotted complaining that the group they rent the malware from could be

Read more

How to Prevent Corporate Data Leaks in the Cloud

Forget shadowy attackers deploying bespoke zero-day exploits from afar. A risk that is far more real for organizations as they

Read more

New Malware Uses Windows Subsystem for Linux for Stealthy Attacks

Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that hackers are trying

Read more

Attackers Exploit Poor Cyber Hygiene to Compromise Cloud Security Environments

CISA is aware of several recent successful cyberattacks against various organizations’ cloud services. Threat actors used a variety of tactics

Read more