Active Threat Alerts

2021 Top Malware Strains | CISA

Agent Tesla

alert any any -> any any (msg:”HTTP…
August 4, 2022/by SecureTech

North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector


The Federal Bureau…
July 7, 2022/by SecureTech

#StopRansomware: MedusaLocker | CISA


Actions to take…
June 30, 2022/by SecureTech

Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems

Actions to take today:• Install fixed builds, updating all…
June 23, 2022/by SecureTech

People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

Best Practices• Apply patches as soon as possible• Disable…
June 8, 2022/by SecureTech

Karakurt Data Extortion Group | CISA

Actions to take today to mitigate cyber threats from ransomware:•…
June 2, 2022/by SecureTech

Threat Actors Exploiting F5 BIG-IP CVE-2022-1388

Actions for administrators to take today:• Do not expose…
May 19, 2022/by SecureTech

Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control

The Cybersecurity and Infrastructure Security Agency (CISA)…
May 18, 2022/by SecureTech

Weak Security Controls and Practices Routinely Exploited for Initial Access

Best Practices to Protect Your Systems:• Control access.•…
May 17, 2022/by SecureTech

Protecting Against Cyber Threats to Managed Service Providers and their Customers

Tactical actions for MSPs and their customers to take today:•…
May 11, 2022/by SecureTech

2021 Top Routinely Exploited Vulnerabilities

This joint Cybersecurity Advisory (CSA) was coauthored by cybersecurity…
April 28, 2022/by SecureTech

Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

Russian State-Sponsored Cyber Operations

Russian state-sponsored…
April 21, 2022/by SecureTech

TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies

Actions to take today to mitigate cyber threats to cryptocurrency:•…
April 19, 2022/by SecureTech

APT Cyber Tools Targeting ICS/SCADA Devices


Actions to Take…
April 13, 2022/by SecureTech

Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector

March 25, 2022/by SecureTech

Strengthening Cybersecurity of SATCOM Network Providers and Customers

Actions to Take Today:• Use secure methods for authentication.•…
March 18, 2022/by SecureTech

Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability


Multifactor Authentication…
March 16, 2022/by SecureTech

Destructive Malware Targeting Organizations in Ukraine

Actions to Take Today:• Set antivirus and antimalware programs…
February 26, 2022/by SecureTech

Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks


Actions to Take…
February 24, 2022/by SecureTech

New Sandworm Malware Cyclops Blink Replaces VPNFilter


The Sandworm actor,…
February 23, 2022/by SecureTech

Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology


Actions to Help…
February 17, 2022/by SecureTech

2021 Trends Show Increased Globalized Threat of Ransomware


Immediate Actions…
February 10, 2022/by SecureTech

Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure


Actions Critical…
January 12, 2022/by SecureTech

Mitigating Log4Shell and Other Log4j-Related Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA),…
December 22, 2021/by SecureTech

APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus


This joint Cybersecurity…
December 3, 2021/by SecureTech

Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities


Actions to Take…
November 17, 2021/by SecureTech