Members of the Health-ISAC can ingest threat indicators directly into Chronicle to investigate whether the threat is present in their environment. Read More HERE
A sophisticated cyber-espionage attack against high-value targets attending a maritime technology conference in Pakistan this weekend has been in the works since last year.Read More HERE
Avast researchers also discovered and reported two zero-day vulnerabilities, and observed the spread of information-stealing malware, remote access trojans, and botnets.Read More HERE
High-quality tools and standards remain critical components in cybersecurity efforts even as budgets decline. It’s important that staff knows response procedures and their roles, and also communicates well. Read More HERE