Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: Government
-
Overview Phish Tale of the Week Colonial Pipeline Didn’t have MFA in Place, Neither Do Most Defense Contractors US Defense Contractors Fail to Meet CMMC Requirements How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a…
-
Overview Phish Tale of the Week Self-Promoting Cybersecurity Firms Doing More Harm Than Good Almost 500,000 job openings in cybersecurity nationwide How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting unsuspecting FedEx…
-

Americans on the East Coast have found themselves on the wrong end of one of the most impactful ransomware attacks this country has ever seen. The FBI reported earlier this week that a group known as DarkSide has claimed responsibility for an attack that caused the shutdown of the Colonial Pipeline. On Friday, May 7th, Colonial announced that they had halted…
-

Overview Phish Tale of the Week 533 Million Facebook Users’ Personal Identifiable Information Leaked Online Fleecware Apps Accumulate $400M in Revenue How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting unsuspecting JPMorgan…
-

Overview Phish Tale of the Week U.S issues warning after Microsoft says China hacked its mail server program Ransomware as a service is the new big problem for business How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance,…
-

Although DFARS CUI compliance and CMMC programs do overlap, the assessment (audit) process will be significantly different moving forward
-

Routine vulnerability assessments evaluate what risks and threats exist for your business systems, assign severity levels to them, and ultimately recommend modifications or countermeasures to minimize the risk of a breach.
-

The US Food and Drug Administration (FDA) plans to tackle security issues related to medical devices and has released a plan of action it means to implement in the near future. Read More………….
-

LONDON — The United States and Britain on Monday issued a first-of-its-kind joint warning about Russian cyberattacks against government and private organizations as well as individual homes and offices in both countries, a milestone in the escalating use of cyberweaponry between major powers. Read More………
-

Artificial intelligence is being incorporated into a range of cyber security products, but the technology may also introduce new threats, a report warns Artificial intelligence (AI) poses a range of threats to cyber, physical and political security, according to a report by 26 UK and US experts and researchers. The Malicious use of artificial intelligence report examines the…