Daixin Team is a ransomware and data extortion group Actions to take today to mitigate cyber threats from ransomware: Install updates for operating systems, software, and firmware as soon as they are released.• Require phishing-resistant MFA for as many services as possible.• Train users to recognize and report phishing attempts.Note:…
Category: Cyber Security
cyber security news and knowledge and tips to protect yourself
Iranian Government Sponsored Crypto Miner
From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability in an unpatched VMware Horizon…
Free course Introduction to Cyber security
Introduction to Cyber security The most important basic course for everyone. Introduction to Cyber security helps in maintaining cyber hygiene. Why cybersecurity is important? We use mobile phones and computers for our daily activities. We often do not have enough background information on the precautions we need to take. Hence…
Iranian State Actors Conduct Cyber Operations
Iranian State Actors Conduct Cyber Operations The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory to provide information on recent cyber operations against the Government of Albania in July and September. This advisory provides a timeline of activity observed,…
AA22-265A: Control System Defense: Know the Opponent
Control System Defense Traditional approaches to securing OT/ICS do not adequately address current threats. Operational technology/industrial control system (OT/ICS) assets that operate, control, and monitor day-to-day critical infrastructure and industrial processes continue to be an attractive target for malicious cyber actors. These cyber actors, including advanced persistent threat (APT) groups,…
AA22-249A: #StopRansomware: Vice Society
Stop Ransomware Summary Actions to take today to mitigate cyber threats from ransomware: Prioritize and remediate known exploited vulnerabilities.• Train users to recognize and report phishing attempts.• Enable and enforce multifactor authentication.
AA22-321A: #StopRansomware: Hive Ransomware
Hive Ransomware source Summary Actions to Take Today to Mitigate Cyber Threats from Ransomware: • Prioritize remediating known exploited vulnerabilities.• Enable and enforce multifactor authentication with strong passwords• Close unused ports and remove any application not deemed necessary for day-to-day operations. Note: This…
Cyber Security Alerts
Cyber Security Alerts Alerts from the FBI, CISA, NSA, and others For basic training please check “Suddhavichara Cybersecurity training“ Free Psychology videos
Quick-start what is Null, Zero, Infinity, and Void
Null, Zero, Infinity, and Void If you are into computers and software programming, I bet you heard about Null and Void. Zero and Infinity we study in school mathematics. What is the difference between Null and Void? What is the difference between Null and Zero? Null means no value and…