Automation, ID & Zero Trust: NIST Scientists Speak

Zero-trust security “is not one single product that one can purchase off the shelf,” a NIST scientist observes. But underlying zero trust’s many component parts are a few critical elements, including identity and automation.

VPN Patch Released For 24 Federal Agencies

VPN Patch Released For 24 Federal Agencies
VPN Patch Released For 24 Federal Agencies

The patch secures a zero-day vulnerability disclosed last month and is just one of four vulnerabilities being actively exploited in Pulse Connect Secure.

CISA Investigates Possible Hacks of Federal Agencies

CISA Investigates Possible Hacks of Federal Agencies
CISA Investigates Possible Hacks of Federal Agencies

“We are working with each agency to validate whether an intrusion has occurred and will offer incident response support accordingly,” CISA’s deputy executive assistant director told Breaking Defense.

‘Mandatory’ Cyber Info Sharing Bill Coming, Says Senate Intel Chair Warner

‘Mandatory’ Cyber Info Sharing Bill Coming, Says Senate Intel Chair Warner
‘Mandatory’ Cyber Info Sharing Bill Coming, Says Senate Intel Chair Warner

“My hope is that we can create this structure… to get an early warning system,” the Senate Intel Committee chair said. “Voluntary sharing is no longer effective.”

US Agencies, Defense Companies Hacked Via VPNs

US Agencies, Defense Companies Hacked Via VPNs
US Agencies, Defense Companies Hacked Via VPNs

Threat actors are targeting one newly discovered and three previously known vulnerabilities in Pulse Connect Secure enterprise VPNs, according to a CISA emergency directive and alert, as well as blog posts by FireEye and Ivanti. “There is no indication the identified backdoors were introduced through a supply chain compromise of the company’s network or software deployment process,” FireEye noted.

STRATCOM Head Tells Hill He’s ‘Confident’ In NC3 Cybersecurity

STRATCOM Head Tells Hill He’s ‘Confident’ In NC3 Cybersecurity
STRATCOM Head Tells Hill He’s ‘Confident’ In NC3 Cybersecurity

“If you try to life-extend a weapon system that was built before the invention of the Internet, and then turn around and ask me why it’s not cyber-secure — I don’t know how,” Adm. Charles Richard told SASC today.

White House Winds Down SolarWinds, Exchange Cyber Teams

White House Winds Down SolarWinds, Exchange Cyber Teams
White House Winds Down SolarWinds, Exchange Cyber Teams

“The innovations… and the lessons learned from these responses will be used to improve future unified, whole of government responses to significant cyber incidents,” the White House says.

US Slaps Russia With Sanctions Plus For SolarWinds Hack

US Slaps Russia With Sanctions Plus For SolarWinds Hack
US Slaps Russia With Sanctions Plus For SolarWinds Hack

The White House Executive Order comes on the same day that CISA and CNMF issue SolarWinds-related malware analysis and NSA-CISA-FBI issue a joint advisory warning of ongoing SVR exploitation of known vulnerabilities in common products.

SolarWinds Hack: ‘The Truth Is Much More Complicated’

SolarWinds Hack: ‘The Truth Is Much More Complicated’
SolarWinds Hack: ‘The Truth Is Much More Complicated’

SolarWinds threat actor reportedly accessed DHS emails and DoE schedules. Cyberespionage campaigns are “the types of things we should expect [Russia] to do,” one cybersecurity expert observed. “I’m not arguing we shouldn’t have a response. We should respond. …My only argument is that we should not overact.”

Nakasone Warns Adversaries Hack Unseen In US

Nakasone Warns Adversaries Hack Unseen In US
Nakasone Warns Adversaries Hack Unseen In US

“We should understand what our adversaries are doing,” Gen. Nakasone told Congress. “They are no longer launching attacks from different parts in the world. They understand that they can come into the US, use our infrastructure, and there’s a blind spot for us not being able to see them.”

A ‘Wake-Up Call’ For Defense IT, Comms Supply Chains: ODNI

A ‘Wake-Up Call’ For Defense IT, Comms Supply Chains: ODNI
A ‘Wake-Up Call’ For Defense IT, Comms Supply Chains: ODNI

Corell spoke on information and communications tech (ICT) supply chain risks on the same day DARPA and Intel announced a three-year partnership to develop and domestically manufacture new semiconductors for DoD applications.

Why Was The SolarWinds Campaign So Difficult to Detect?

Why Was The SolarWinds Campaign So Difficult to Detect?
Why Was The SolarWinds Campaign So Difficult to Detect?

Only after months of investigation by nearly 100 highly skilled digital forensics experts did FireEye discover the malicious “implant” in the most unlikely place. We break it all down in plain language.

Retaliation Options: US Cyber Responses To SolarWinds, Exchange Hacks

Retaliation Options: US Cyber Responses To SolarWinds, Exchange Hacks
Retaliation Options: US Cyber Responses To SolarWinds, Exchange Hacks

Three experts gave us exclusive in-depth insights into the administration’s potential menu of retaliatory options, along with U.S. cyber strategic, policy, and operations considerations.

CYBERCOM Plays ‘Key Role’ As SolarWinds Unfolds: Gen. Nakasone

CYBERCOM Plays ‘Key Role’ As SolarWinds Unfolds: Gen. Nakasone
CYBERCOM Plays ‘Key Role’ As SolarWinds Unfolds: Gen. Nakasone

As the government investigation continues, security firm FireEye published details of newly discovered backdoor, SUNSHUTTLE, which has “possible connection” to the SolarWinds hack.