Active Threat Alerts
Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control
The Cybersecurity and Infrastructure Security Agency (CISA)…
May 18, 2022/by SecureTechWeak Security Controls and Practices Routinely Exploited for Initial Access
Best Practices to Protect Your Systems:• Control access.•…
May 17, 2022/by SecureTechProtecting Against Cyber Threats to Managed Service Providers and their Customers
Tactical actions for MSPs and their customers to take today:•…
May 11, 2022/by SecureTech2021 Top Routinely Exploited Vulnerabilities
This joint Cybersecurity Advisory (CSA) was coauthored by cybersecurity…
April 28, 2022/by SecureTechRussian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure
Russian State-Sponsored Cyber Operations
Russian state-sponsored…
April 21, 2022/by SecureTechRussian state-sponsored…

TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies
Actions to take today to mitigate cyber threats to cryptocurrency:•…
April 19, 2022/by SecureTechAPT Cyber Tools Targeting ICS/SCADA Devices
Summary
Actions to Take…
April 13, 2022/by SecureTechActions to Take…
Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector
Tactic
Technique
Use
Detection/Mitigations
Reconnaissance…
March 25, 2022/by SecureTechTechnique
Use
Detection/Mitigations
Reconnaissance…
Strengthening Cybersecurity of SATCOM Network Providers and Customers
Actions to Take Today:• Use secure methods for authentication.•…
March 18, 2022/by SecureTechRussian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability
Summary
Multifactor Authentication…
March 16, 2022/by SecureTechMultifactor Authentication…
Destructive Malware Targeting Organizations in Ukraine
Actions to Take Today:• Set antivirus and antimalware programs…
February 26, 2022/by SecureTech
Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks
Summary
Actions to Take…
February 24, 2022/by SecureTechActions to Take…
New Sandworm Malware Cyclops Blink Replaces VPNFilter
Summary
The Sandworm actor,…
February 23, 2022/by SecureTechThe Sandworm actor,…
Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology
Summary
Actions to Help…
February 17, 2022/by SecureTechActions to Help…
2021 Trends Show Increased Globalized Threat of Ransomware
Summary
Immediate Actions…
February 10, 2022/by SecureTechImmediate Actions…
Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure
Summary
Actions Critical…
January 12, 2022/by SecureTechActions Critical…
Mitigating Log4Shell and Other Log4j-Related Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA),…
December 22, 2021/by SecureTechAPT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus
Summary
This joint Cybersecurity…
December 3, 2021/by SecureTechThis joint Cybersecurity…
Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities
Summary
Actions to Take…
November 17, 2021/by SecureTechActions to Take…
BlackMatter Ransomware | CISA
Summary
Actions You Can…
October 19, 2021/by SecureTechActions You Can…
Ongoing Cyber Threats to U.S. Water and Wastewater Systems
Summary
Immediate Actions…
October 14, 2021/by SecureTechImmediate Actions…
Conti Ransomware | CISA
Summary
Immediate Actions…
September 23, 2021/by SecureTechImmediate Actions…
APT Actors Exploiting Newly Identified Vulnerability in ManageEngine ADSelfService Plus
Summary
This Joint Cybersecurity…
September 17, 2021/by SecureTechThis Joint Cybersecurity…
Ransomware Awareness for Holidays and Weekends
Immediate Actions You Can Take Now to Protect Against Ransomware•…
August 31, 2021/by SecureTechBadAlloc Vulnerability Affecting BlackBerry QNX RTOS
On August 17, 2021, BlackBerry publicly disclosed that its…
August 18, 2021/by SecureTechTop Routinely Exploited Vulnerabilities | CISA
This Joint Cybersecurity Advisory was coauthored by the U.S.…
July 28, 2021/by SecureTech