Brett :cheers: · @brett
474 followers · 336 posts · Server mas.town

In 2022, conducted a red team assessment at the request of a large critical infrastructure organization with multiple geographically separated sites. The team gained persistent access to the organization’s network, moved laterally across its sites, and gained access to systems adjacent the org’s sensitive business systems.

Despite having a mature cyber posture, the organization did not detect the red team’s activity.

Read the key findings here:

cisa.gov/news-events/cybersecu

#CISA #cybersecurity

Last updated 1 year ago

· @twitter
1 followers · 47369 posts · Server mstdn.skullb0x.io
· @twitter
1 followers · 46367 posts · Server mstdn.skullb0x.io
Dan Oachs · @doachs
108 followers · 325 posts · Server ipv6.social

I don't know why, but I found this report from CISA very interesting ( and quite worrisome ) to read.

cisa.gov/news-events/cybersecu

#infosec #CISA

Last updated 1 year ago

Brett :cheers: · @brett
445 followers · 315 posts · Server mas.town

This advisory highlights TTPs and IOCs DPRK cyber actors used to gain access to and conduct ransomware attacks against Healthcare and Public Health (HPH) Sector organizations and other critical infrastructure sector entities, as well as DPRK cyber actors’ use of cryptocurrency to demand ransoms.

media.defense.gov/2023/Feb/09/

#cybersecurity #dprk #ransomware #infosec #fbi #NSA #CISA

Last updated 2 years ago

· @twitter
1 followers · 39584 posts · Server mstdn.skullb0x.io
Brett :cheers: · @brett
246 followers · 322 posts · Server mas.town

A new Cybersecurity Advisory provides the top used by People’s Republic of China (PRC) state-sponsored cyber actors as assessed by the , , & , to actively target U.S. and allied networks as well as software and hardware companies to steal intellectual property and develop access into sensitive networks.

Available here:

media.defense.gov/2022/Oct/06/

#cves #fbi #NSA #CISA #cybersecurity #cyber #PRC #China

Last updated 2 years ago

Brett :cheers: · @brett
81 followers · 168 posts · Server mas.town

@jerry - I’m a little confused by the issue. Their mission is to defend critical infrastructure and private sector networks from major attacks. Their role is not to crack down on legitimate penetration tests, bug bounty programs, vulnerability assessments, etc.

As importantly - they share IOCs, TTPs, and USG/World intel with communities to help defend data and information.

What is the problem with allowing them on an instance, or in the ?!

#CISA #infosec #fediverse #cybersecurity

Last updated 2 years ago

Brett :verified: · @brett
16 followers · 48 posts · Server mas.town