Cyber Extortion Symposium – Keeping eCriminals at Bay

According to the cybersecurity firm, CrowdStrike, there were more than 40,000 cyber intrusions in just the first half of 2020 alone. What were the hackers looking to accomplish with the cyber intrusions? Since 63 percent of incidents CrowdStrike investigated in…

Work from home and neglected clouds – CrowdStrike Services Report shows 2020 was a virtual playground for hackers

Earlier this month, CrowdStrike released its annual CrowdStrike Services Cyber Front Lines Report, a report that outlines the trends that the firm identified from client engagements and key cybersecurity themes identified from the prior year. Candidly, it’s a report that…

Nation-state attack on government validates concerns about AppSec and supply chain security

One of the top trends that we witnessed covering government and military cybersecurity in 2020 – aside from the massive upswing in threats that accompanied the ongoing COVID-19 pandemic – was a renewed and increased focus on securing the supply…

WIZARD SPIDER unleashes Conti ransomware to extort millions

Threat actors continue to find new ways of disrupting life for their own financial gain. And sometimes their new ways are modifications of previously effective malware or ransomware, usually with an added punch. In the last year, the damaging Ryuk…

Why machine learning is the right approach for securing multi-platform data environments

The cloud’s scalability, flexibility, and cost savings have federal government agencies replacing some traditional, physical data center infrastructure with cloud services. This also led to the federal “Cloud First” mandate which required agencies to consider available cloud solutions before building…

The newest tools in the terrorist toolbox: cyberattacks and cyberwarfare

When we think about America’s adversaries in cyberspace, we think of large, near-peer nation-states with sophisticated militaries’ incredibly capable cyberwarriors at their disposal. We think of countries like Russia, China, and North Korea. But the threat against America extends beyond…

Leveraging AI and ML to fight back against government cyber threats

This article was contributed by Carolyn Duby, the Solutions Architect and Cyber Security Lead at Cloudera.Gartner anticipates an estimated 300 percent growth in connected devices by 2020 sparked by faster 5G networks bringing an explosion of inexpensive, connected devices. While this…

The 3 types of DDoS attacks being launched at your VPN

As we’ve discussed previously on the GovSecurityHub, the response to the COVID-19 pandemic and the resulting stay-at-home orders have resulted in more people working from home. This has led to a drastic increase in corporate VPN use over the past…

VPN, DDoS and the coronavirus – how hackers could shut down the federal workforce

As the world undertakes what has been called the “world’s largest work-from-home experiment” and with over 10 million workers in the US – including government workers – now scrambling to connect to their workplace servers and infrastructure from their bedrooms,…

The most reliable approach to incident response and forensics

Every government organization has been the victim of a cybersecurity incident. These can range from mundane incidents such as a user leaving their desk without locking their screen, up to a major breach such as the OPM hack in which…