Tag: network

  • Alerts: CISA and Partners Release Cybersecurity Advisory on Medusa Ransomware

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/12/cisa-and-partners-release-cybersecurity-advisory-medusa-ransomware Source: Alerts Title: CISA and Partners Release Cybersecurity Advisory on Medusa Ransomware Feedly Summary: Today, CISA—in partnership with the Federal Bureau of Investigation (FBI) and Multi-State Information Sharing and Analysis Center (MS-ISAC)—released joint Cybersecurity Advisory, #StopRansomware: Medusa Ransomware. This advisory provides tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and detection…

  • The Register: Expired Juniper routers find new life – as Chinese spy hubs

    Source URL: https://www.theregister.com/2025/03/12/china_spy_juniper_routers/ Source: The Register Title: Expired Juniper routers find new life – as Chinese spy hubs Feedly Summary: Fewer than 10 known victims, but Mandiant suspects others compromised, too Chinese spies have for months exploited old Juniper Networks routers, infecting the buggy gear with custom backdoors and gaining root access to the compromised…

  • Cloud Blog: Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers/ Source: Cloud Blog Title: Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers Feedly Summary: Written by: Lukasz Lamparski, Punsaen Boonyakarn, Shawn Chew, Frank Tse, Jakub Jozwiak, Mathew Potaczek, Logeswaran Nadarajan, Nick Harbour, Mustafa Nasser Introduction In mid 2024, Mandiant discovered threat actors deployed custom backdoors on Juniper Networks’ Junos…

  • The Register: This is the FBI, open up. China’s Volt Typhoon is on your network

    Source URL: https://www.theregister.com/2025/03/12/volt_tyhoon_experience_interview_with_gm/ Source: The Register Title: This is the FBI, open up. China’s Volt Typhoon is on your network Feedly Summary: Power utility GM talks to El Reg about getting that call and what happened next Nick Lawler, general manager of the Littleton Electric Light and Water Departments (LELWD), was at home one Friday…

  • NCSC Feed: Joint report on publicly available hacking tools

    Source URL: https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools Source: NCSC Feed Title: Joint report on publicly available hacking tools Feedly Summary: How to limit the effectiveness of tools commonly used by malicious actors. AI Summary and Description: Yes Summary: The report discusses collaboration among five nations’ cyber security authorities and evaluates the impact of publicly-available tools used in recent cyber…

  • NCSC Feed: ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance

    Source URL: https://www.ncsc.gov.uk/guidance/roca-infineon-tpm-and-secure-element-rsa-vulnerability-guidance Source: NCSC Feed Title: ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance Feedly Summary: Guidance for those who want to understand and reduce the impact of the ROCA vulnerability. AI Summary and Description: Yes Summary: The provided text discusses the implementation and vulnerabilities of Trusted Platform Modules (TPMs) and Secure Elements…

  • NCSC Feed: Provisioning and securing security certificates

    Source URL: https://www.ncsc.gov.uk/guidance/provisioning-and-securing-security-certificates Source: NCSC Feed Title: Provisioning and securing security certificates Feedly Summary: How certificates should be initially provisioned, and how supporting infrastructure should be securely operated. AI Summary and Description: Yes Summary: The text discusses the implementation and management of X.509v3 certificates and Public Key Infrastructure (PKI) necessary for securing communications in networks.…