The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. "People's Republic of China-linked (PRC) malicious cyber actors continue to target U.S. government systems, … [Read more...] about U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon
Modern Security for Legacy Environments
Many organizations across critical industries such as healthcare, manufacturing and energy rely on legacy Windows operating systems to run essential equipment. These systems, while operationally vital, are notoriously difficult and costly to upgrade — leaving them vulnerable to modern cyber threats. CrowdStrike is addressing this challenge by expanding our legacy support … [Read more...] about Modern Security for Legacy Environments
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Jan 17, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking … [Read more...] about Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Forrester TEI Study – Falcon Identity Protection
Identity-based attacks are surging across today’s threat landscape as adversaries target identities in on-premises, cloud and SaaS applications. They aren’t breaking in — they’re logging in. Organizations must respond to these threats in real time to stop breaches, but traditional security approaches consisting of siloed tools often create visibility gaps and hinder … [Read more...] about Forrester TEI Study – Falcon Identity Protection
Zero Trust Strengthens Data Protection to Achieve National Cyber Strategy Goals
CrowdStrike recently announced FedRAMP authorization for CrowdStrike Falcon® Data Protection, now available to government entities requiring Federal Risk and Authorization Management Program (FedRAMP) Moderate authorization, enabling them to secure assets through the CrowdStrike Falcon Platform in GovCloud. This advancement supports compliance efforts and adoption of Zero Trust … [Read more...] about Zero Trust Strengthens Data Protection to Achieve National Cyber Strategy Goals
Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting
Jan 16, 2025Ravie LakshmananSpear Phishing / Threat Intelligence The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. "Star Blizzard's targets are most commonly related to government or diplomacy … [Read more...] about Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting
Critical Evolution of Cloud Detection and Response
When Conventional Security Meets Modern Cloud Threats As organizations face these cross-domain attacks, the inability to connect cloud context with detection and alerting is reaching its breaking point. Most organizations begin their cloud security journey focused on visibility through CNAPP solutions. CNAPP identifies misconfigurations, excessive permissions and … [Read more...] about Critical Evolution of Cloud Detection and Response
January 2025 Patch Tuesday: Updates and Analysis
Actively Exploited Zero-Day Vulnerabilities in Windows Hyper-V NT Kernel Integration VSP Windows Hyper-V NT Kernel Integration VSP received patches for CVE-2025-21333, CVE-2025-21334 and CVE-2025-21335, which all have a severity of Important and a CVSS score of 7.8. These elevation of privilege (EoP) vulnerabilities allow an attacker who successfully exploits them to gain … [Read more...] about January 2025 Patch Tuesday: Updates and Analysis
Security for Enterprise AI Adoption
Today, we are witnessing artificial intelligence radically reshape the way we do business. Last year, we published our Cisco AI Readiness Index, which provided critical insights into the state of enterprise AI adoption. In both our survey results and my own conversations with business leaders, a common trend was evident. Despite growing pressures to harness this … [Read more...] about Security for Enterprise AI Adoption
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Jan 15, 2025Ravie LakshmananMalvertising / Malware Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. "The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and … [Read more...] about Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes