#cisa

[ follow ]
Information security
fromFast Company
1 day ago

U.S. cybersecurity was bad during the first Trump administration. Somehow, it's getting worse.

CISA faces severe degradation: leadership vacancy, mass staff departures, mission cuts, and furloughs amid escalating foreign cyberattacks and risky domestic data collection.
#cybersecurity
fromSecurityWeek
1 day ago
Information security

Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure

Information security
fromNextgov.com
4 weeks ago

Nick Andersen onboards into top CISA cyber position

Nick Andersen began serving as executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency.
US politics
fromNextgov.com
1 month ago

CISA's head of legislative affairs to soon depart

Kate DiEmidio will leave her role as CISA's legislative affairs chief this Friday after three months, departing voluntarily with future plans unclear.
fromSecurityWeek
1 day ago
Information security

Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure

Information security
fromSecurityWeek
2 days ago

Organizations Warned of Exploited Sudo Vulnerability

A critical Sudo local privilege escalation (CVE-2025-32463) allows any user to gain root privileges and has been exploited, requiring urgent patching.
Information security
fromTheregister
2 days ago

CISA kills agreement with nonprofit that runs MS-ISAC

CISA will end its cooperative agreement and funding for the Center for Internet Security on September 30, 2025, shifting to a new SLTT support model.
fromNextgov.com
3 days ago

Shutdown could erode cyber defenses by sidelining critical staff, experts warn

At stake is a diminished workforce with less capability to analyze and track cyber threats, as well as a bedrock cybersecurity data-sharing law that would expire in tandem with that lapse in appropriations, they told Nextgov/FCW. A shutdown would exacerbate risks to critical infrastructure because staff and resources would be less available for infrastructure owners and operators to access, said Ilona Cohen, chief legal and policy officer at HackerOne and former general counsel at the Office of Management and Budget.
US politics
fromNextgov.com
1 week ago

CISA issues emergency patching directive for Cisco devices on federal networks

The Cybersecurity and Infrastructure Security Agency is ordering federal agencies to patch Cisco devices that have been exploited by an advanced hacker group, it said in a Thursday alert. The hacking activity targeting the devices "is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution" on various Cisco Adaptive Security Appliances, CISA said. A "zero-day" refers to a software flaw that's being exploited but has not been previously discovered, giving developers zero days to fix it.
Information security
fromTheregister
1 week ago

SonicWall releases rootkit-busting firmware update

The update comes about two months after Google warned that some unknown criminals have been exploiting fully patched, end-of-life SonicWall SMA 100 appliances to deploy a previously unknown backdoor and rootkit dubbed OVERSTEP. The malware modifies the appliance's boot process to maintain persistent access, enabling the criminals to steal sensitive credentials and conceal their own components. The Chocolate Factory's intel analysts in July attributed the ongoing campaign to UNC6148 - UNC in Google's threat-group naming taxonomy stands for "Uncategorized."
Information security
#cve-program
fromNextgov.com
2 weeks ago
Information security

CISA wants more international involvement in cyber vulnerability catalog, official says

fromNextgov.com
3 weeks ago
Information security

CISA weighs 'alternative funding sources' to preserve cyber vulnerability-tracking project

fromNextgov.com
2 weeks ago
Information security

CISA wants more international involvement in cyber vulnerability catalog, official says

fromNextgov.com
3 weeks ago
Information security

CISA weighs 'alternative funding sources' to preserve cyber vulnerability-tracking project

US politics
fromTheregister
2 weeks ago

CISA misspent millions in cyber skill retention funds: audit

CISA mismanaged the Cyber Incentive program, allowing widespread ineligible payments, poor recordkeeping, and reduced capacity to protect the nation from cyber threats.
Information security
fromTheregister
2 weeks ago

CISA attempts to assert control over CVE in vision outline

CISA aims to assert governmental control over the CVE program, transitioning it from a growth era to a government-led "quality era" beginning in 2025.
fromNextgov.com
2 weeks ago

CISA ready to accept any extension for key cyber info-sharing law, official says

We'll take whatever the Congress decides to authorize us, wherever they see fit within their purview, to authorize and to give us our authorities to be able to use,
Information security
Information security
fromDataBreaches.Net
3 weeks ago

CISA Delays Cyber Incident Reporting Rule for Critical Infrastructure - DataBreaches.Net

CISA plans to publish the CIRCIA Final Rule in May 2026, delaying its expected October 2025 arrival and likely postponing its effective date.
Information security
fromTheregister
4 weeks ago

Congress tosses lifeline to cyber intel sharing, grants

Congress must reauthorize and extend cyber information-sharing authorities like CISA to maintain private–public threat intelligence collaboration and protect critical infrastructure.
#ransomware
Information security
fromDataBreaches.Net
1 month ago

CISA steps in to help Nevada state government recover from cyberattack - DataBreaches.Net

CISA, the FBI, and other federal and state teams are collaborating to investigate, contain, and restore Nevada's systems after a cyberattack while securing recovery grants.
Information security
fromSecuritymagazine
1 month ago

CISA Issues Software Bill of Materials Draft, Encourages Public Comments

Updated minimum elements for SBOMs guide standardized, machine-readable SBOM generation and sharing to improve software supply chain transparency and risk-informed cybersecurity decisions.
fromTheregister
1 month ago

Microsoft Exchange bug can allow 'total domain compromise'

CVE-2025-53786 is an elevation of privilege bug that Outsider Security's Dirk-jan Mollema reported to Microsoft. It exists because of the way hybrid Exchange deployments, which connect on-premises Exchange servers to Exchange Online, use a shared identity to authenticate users between the two environments.
Privacy professionals
fromTheregister
1 month ago

CISA releases malware analysis for Sharepoint Server attack

CISA analysed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.
Privacy professionals
fromThe Hacker News
1 month ago

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization's connected cloud environment without leaving easily detectable and auditable traces.
Privacy professionals
US politics
fromNextgov.com
2 months ago

Trump's CISA nominee to testify before Senate panel next week

Sean Plankey is scheduled to testify before the Senate Homeland Security Committee regarding his nomination to lead the Cybersecurity and Infrastructure Security Agency.
fromBreaking Defense
3 months ago

Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security

Homeland Security's Cybersecurity & Infrastructure Security Agency warned US defense contractors working in Israel that they may be targeted by Iranian cyber attacks.
US politics
fromIT Pro
3 months ago

Want to build more secure software? Follow these key memory safe language tips from CISA

Achieving better memory safety demands language-level protections, library support, robust tooling, and developer training, as traditional languages can't eliminate vulnerabilities as effectively.
Software development
fromTheregister
3 months ago

AWS enforces MFA across 100% of root users: re:Inforce

For anyone who still has doubts about MFA: just ask Snowflake CISO Brad Jones, who last year saw more than 160 of his customers' accounts compromised using stolen credentials. None of these had MFA enabled, and this safeguard likely would have prevented the intruders from accessing the customers' databases.
Marketing tech
fromIT Pro
5 months ago

CISA issues warning in wake of Oracle cloud credentials leak

CISA warns of potential data breach risks from a security incident involving legacy Oracle cloud environments, urging enterprises to strengthen their security defenses.
Information security
#chris-krebs
fromArs Technica
5 months ago
Privacy professionals

Chris Krebs, who debunked 2020 election lies, vows full-time fight against Trump

CISA's Chris Krebs was terminated by Trump after debunking election fraud claims, emphasizing integrity amidst political pressure.
fromTechzine Global
5 months ago
Privacy professionals

SentinelOne exec Krebs leaves following Trump pressure

Chris Krebs resigns from SentinelOne to focus on fighting Trump's retaliatory actions against him and the company.
Privacy professionals
fromArs Technica
5 months ago

Chris Krebs, who debunked 2020 election lies, vows full-time fight against Trump

CISA's Chris Krebs was terminated by Trump after debunking election fraud claims, emphasizing integrity amidst political pressure.
[ Load more ]