Software development and delivery supply chains are attractive targets for malicious cyber actors. They can use these environments to compromise…
Malicious cyber actors could take advantage of a known vulnerability in the Microsoft Windows secure startup process to bypass Secure…
Baseboard management controllers (BMCs) are common components of server-class computers. Malicious cyber actors could use these controllers’ capabilities to compromise…
Legitimate remote access software is being used by cyber actors to access victims’ systems, blend in with regular network activities,…
On June 5, Fairfax, VA-based General Dynamics Mission Systems announced that it received a contract from the National Security Agency…
On June 1, the National Security Agency (NSA) announced that it is partnering with several organizations to highlight the Democratic…
To guide network defenders in protecting against the rapidly evolving ransomware tactics of malicious cyber actors, the National Security Agency…
The National Security Agency (NSA) and partners have identified indicators of compromise (IOCs) associated with a People’s Republic of China…
On May 23, Carlsbad, CA-based Viasat Inc. announced its next-generation ground-to-space encryption product, the KG-255XJ, is now National Security Agency (NSA) Type-1…
The National Security Agency (NSA) and several partner agencies have identified infrastructure for Snake malware—a sophisticated Russian cyberespionage tool—in over…