WIZARD SPIDER unleashes Conti ransomware to extort millions

Threat actors continue to find new ways of disrupting life for their own financial gain. And sometimes their new ways are modifications of previously effective malware or ransomware, usually with an added punch. In the last year, the damaging Ryuk…

Why machine learning is the right approach for securing multi-platform data environments

The cloud’s scalability, flexibility, and cost savings have federal government agencies replacing some traditional, physical data center infrastructure with cloud services. This also led to the federal “Cloud First” mandate which required agencies to consider available cloud solutions before building…

The newest tools in the terrorist toolbox: cyberattacks and cyberwarfare

When we think about America’s adversaries in cyberspace, we think of large, near-peer nation-states with sophisticated militaries’ incredibly capable cyberwarriors at their disposal. We think of countries like Russia, China, and North Korea. But the threat against America extends beyond…

Leveraging AI and ML to fight back against government cyber threats

This article was contributed by Carolyn Duby, the Solutions Architect and Cyber Security Lead at Cloudera.Gartner anticipates an estimated 300 percent growth in connected devices by 2020 sparked by faster 5G networks bringing an explosion of inexpensive, connected devices. While this…

The 3 types of DDoS attacks being launched at your VPN

As we’ve discussed previously on the GovSecurityHub, the response to the COVID-19 pandemic and the resulting stay-at-home orders have resulted in more people working from home. This has led to a drastic increase in corporate VPN use over the past…

VPN, DDoS and the coronavirus – how hackers could shut down the federal workforce

As the world undertakes what has been called the “world’s largest work-from-home experiment” and with over 10 million workers in the US – including government workers – now scrambling to connect to their workplace servers and infrastructure from their bedrooms,…

The most reliable approach to incident response and forensics

Every government organization has been the victim of a cybersecurity incident. These can range from mundane incidents such as a user leaving their desk without locking their screen, up to a major breach such as the OPM hack in which…

Why schools are getting an “F” in cybersecurity

Right before the holiday season, California’s Tulare Joint Union High School District received a very unwelcome gift – a cyberattack. The attack, which was coined, “very bad and complicated,” by the district’s assistant superintendent, Lucy VanScyoc, in an emailed statement…

Breakout Time and the 1-10-60 rule – the key to saving $4 million

Practically every cybersecurity and IT professional recognizes that it’s not a matter of “if” their organization will be the victim of a cyberattack or breach, it’s “when.” And that’s not surprising considering there were almost 4,000 reported data breaches in…

Practice makes perfect – honing incident response skills

Practice makes perfect. It’s a cliché for a reason, because it’s very true. The more you work at a particular skill or task, the better and more proficient that you become at it. Unfortunately for the cyberwarriors that are tasked…