Report Cyber Crime

Category: ThreatsStrategic

CISA issues emergency warning over critical Windows vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has taken the extraordinary steps of issuing an emergency alert about a critical vulnerability in Windows. CISA issued the warning to government departments, saying it “has determined that this vulnerability poses an unacceptable risk to the Federal Civilian Executive Branch and requires an immediate and emergency action”. With Emergency

Read More
Announcing techUK’s September Cloud Security Champion!

Announcing techUK’s September Cloud Security Champion!

Congratulations to Lesley Kipling, Chief Security Advisor at Microsoft for being selected as techUK’s ‘Cloud Security Champion’ for the month of September.  The purpose of techUK’s Cloud Security Champion campaign is to celebrate the work of UK cloud security specialists in helping build a culture of trust and confidence in cloud computing and showcase how they are supporting

Read More

Microsoft Explains How It Processes Vulnerability Reports

Microsoft has detailed the steps involved in the processing of vulnerability reports, so that reporting researchers know what to expect when submitting information on a bug. The first thing researches need to do, the company says, is to ensure that the issue they have identified indeed qualifies as a security vulnerability, and only then to

Read More
Securing Windows networks against WSUS attacks

Securing Windows networks against WSUS attacks

Previous research WSUS enables IT administrators to deploy the latest Microsoft product updates. Updates are downloaded from Microsoft’s update servers and stored locally on the WSUS server. From here, admins can approve the updates for deployment to their internal clients. Windows clients (desktops and servers) can check the local WSUS server for updates that have

Read More
CISA Pushes Government Agencies to Patch ‘Zerologon’ Flaw

CISA Pushes Government Agencies to Patch ‘Zerologon’ Flaw

Application Security , Fraud Management & Cybercrime , Governance & Risk Management Federal Agencies Need to Report Compliance by Wednesday Jeremy Kirk (jeremy_kirk) • September 22, 2020     CISA Director Christoper Krebs U.S. government agencies are supposed to have patched the “Zerologon” vulnerability by now, about six weeks after Microsoft issued a fix. See

Read More
CISA Pushes Government Agencies to Patch ‘Zerologon’ Flaw

CISA Pushes Government Agencies to Patch ‘Zerologon’ Flaw

Application Security , Fraud Management & Cybercrime , Governance & Risk Management Federal Agencies Need to Report Compliance by Wednesday Jeremy Kirk (jeremy_kirk) • September 22, 2020     CISA Director Christoper Krebs U.S. government agencies are supposed to have patched the “Zerologon” vulnerability by now, about six weeks after Microsoft issued a fix. See

Read More
CISA Pushes Government Agencies to Patch ‘Zerologon’ Flaw

CISA Pushes Government Agencies to Patch ‘Zerologon’ Flaw

Application Security , Fraud Management & Cybercrime , Governance & Risk Management Federal Agencies Need to Report Compliance by Wednesday Jeremy Kirk (jeremy_kirk) • September 22, 2020     CISA Director Christoper Krebs U.S. government agencies are supposed to have patched the “Zerologon” vulnerability by now, about six weeks after Microsoft issued a fix. See

Read More
CISA orders agencies to quickly patch critical Netlogon bug

CISA orders agencies to quickly patch critical Netlogon bug

Written by Sean Lyngaas Sep 21, 2020 | CYBERSCOOP For several days, security experts have urged organizations to fix a critical vulnerability in a Microsoft protocol that hackers could use to steal sensitive data. Now, U.S. government agencies don’t have a choice but to act. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency

Read More

Seven International Cyber Defendants, Including “Apt41” Actors, Charged In Connection With Computer Intrusion Campaigns

Washington, DC – In August 2019 and August 2020, a federal grand jury in Washington, D.C., returned two separate indictments charging five computer hackers, all of whom were residents and nationals of the People’s Republic of China (PRC), with computer intrusions affecting over 100 victim companies in the United States and abroad, including software development

Read More
You’re going to be using confidential computing sooner rather than later

You’re going to be using confidential computing sooner rather than later

Hardly a day goes by without news of yet another major data breach. Every day–every hour–your computers are under attack. Don’t believe me? I run a website, Practical Technology, which is just an archive for my published stories. It’s been attacked so far today, according to WordFence, a top WordPress security program, 29 times today.

Read More