H-ISAC: White Reports

The United States Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the US Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom’s National Cyber Security Centre (NCSC-UK) have observed a group of Iranian government-sponsored…
The United Kingdom National Cyber Security Centre (NCSC), the United States Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have identified that the actor known as Sandworm or Voodoo Bear is using a new…
This week, Hacking Healthcare begins by highlighting the National Institute for Standards and Technology’s (NIST) request for public comment on a potential update to their cybersecurity framework.
In a report from Avanan, researchers identified a file used by threat actors to spearphish users in Microsoft Teams.
On February 18, 2022, the US Cybersecurity and Infrastructure Security Agency (CISA) released a CISA Insights report to provide proactive steps organizations can take to assess and mitigate risks from information manipulation.
From at least January 2020 through February 2022, the United States Federal Bureau of Investigation (FBI), National Security Agency (NSA), and Cybersecurity and Infrastructure Security Agency (CISA) have observed regular targeting of US cleared defense contractors (CDCs) by Russian state-sponsored…
Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety.
A decade of persistent malicious activity targeting groups and individuals in India, including those involved in the Bhima Koregaon case, has been uncovered by SentinelLabs and the UK-based security firm.
This week, Hacking Healthcare begins by examining an article that claims an American civilian took it upon himself to launch a cyberattack against the government of the Democratic People’s Republic of Korea (DPRK). We look at how this case relates to the broader conversation around hacktivism…