article thumbnail

Government Agencies Discover New Chinese Malware Strain

SecureWorld News

And it's a malware strain used specifically by the Chinese government. Chinese government actors are using malware variants in conjunction with proxy servers to maintain a presence on victim networks and to further network exploitation. Keep operating system patches up-to-date. CISA reports on Chinese malware strain.

Malware 53
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

When you read of a government agency being penetrated or a corporation losing data I can almost always guarantee you that they have failed to implement and measure these controls. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches. As a review, they are: 20 Critical Security Controls – Version 4.1.

Security 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

U.S. Census Bureau Targeted in Cyberattack

SecureWorld News

Government agencies continue to be hot targets for cybercriminals. Census Bureau was the target of a cyberattack in January 2020, but hackers were unsuccessful in maintaining access to the system, according to a watchdog report released this week. The Associated Press says the cyberattack did not involve the 2020 census data.

article thumbnail

Advisory: Malicious North Korean Cyber Activity

SecureWorld News

Here's what Blindingcan has accomplished so far: "A threat group with a nexus to North Korea targeted government contractors early this year to gather intelligence surrounding key military and energy technologies. CISA refers to any malicious cyber activity from the North Korean government as Hidden Cobra.

article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

The attackers then mishandle this well-known adversary simulation tool to harvest information about the operating system, exfiltrate data, and locate directories and services with weak access control settings. A DNS firewall and a classic antivirus are somewhat underused yet effective security tools that will come in handy.

article thumbnail

The Cyber Resilience Blueprint: A Proactive GRC Framework

SecureWorld News

This is where developing a hyper-specific Governance, Risk and Compliance (GRC) framework becomes essential. The GRC framework: an overview Governance, Risk, and Compliance (GRC) serve as the pillars of an effective cyber resilience strategy. As a result, good governance ensures everyone knows their role in maintaining cyber health.

article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

United States government agencies recently released a joint Cybersecurity Advisory (CSA) providing information on how North Korean state-sponsored threat actors are actively using Maui ransomware to attack healthcare organizations. The advisory reminds organizations that the U.S. What is Maui ransomware? Mitigations for Maui ransomware.