Official Twitter page of the 780th MI Brigade (Cyber). The Army's only offensive cyberspace operations brigade (following, retweets and links ≠ endorsement).
Jan 11 • 4 tweets • 2 min read
According to researchers suspected Chinese hackers used two previously undiscovered software flaws to break into a US-based research organization last month as part of a persistent spying campaign | @CNNcnn.com/2024/01/10/pol…
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN | @Volexityvolexity.com/blog/2024/01/1…
Jan 6, 2021 • 5 tweets • 2 min read
Joint Statement by the Cyber Unified Coordination Group (UCG), composed of the FBI, CISA, and ODNI with support from NSA: "This work indicates that an APT actor, likely Russian in origin, is responsible..." cisa.gov/news/2021/01/0…
Report on Russian Cyber Units (Congressional Research Service): beta.documentcloud.org/documents/2044… | Collectively, these units are sometimes referred to as APT (Advanced Persistent Threat) 28, Fancy Bear, Voodoo Bear, Sandworm, and Tsar Team.
Dec 22, 2020 • 4 tweets • 3 min read
Maryland U.S. Attorney’s Office Seizes Two Domain Names Purporting to be Websites of Biotechnology Companies Developing Treatments for Covid-19 #becybersmart | justice.gov/usao-md/pr/mar…
The FBI, HHS-OIG, and CMS have received complaints of scammers using the public’s interest in COVID-19 vaccines to obtain personally identifiable information (PII) and money through various schemes. #becybersmartfbi.gov/news/pressrel/…
Dec 15, 2020 • 10 tweets • 4 min read
RT @arstechnica | SolarWinds hackers have a clever way to bypass multi-factor authentication arstechnica.com/information-te…
Thought I'd list a series of reports from various cybersecurity companies in the hope it will assist...
Dec 14, 2020 • 6 tweets • 3 min read
Did you know... "The Embassy of Russia in the USA" has a Facebook and Twitter account? facebook.com/RusEmbUSA/post… and
.
A Zebra in Gopher’s Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy intezer.com/blog/research/…
Dec 14, 2020 • 6 tweets • 3 min read
“The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” said CISA Acting Director Brandon Wales. cisa.gov/news/2020/12/1…
“The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” said CISA Acting Director Brandon Wales. | Mitigate SolarWinds Orion Code Compromise (CISA): cyber.dhs.gov/ed/21-01/