Other Cybersecurity Reports

The security and privacy controls in this publication may be used by organizations to assist their information security and privacy requirements.
Questions regarding this PSA should be directed to your local FBI Field Office. Local Field Office Locations: www.fbi.gov/contact-us/field-offices
The NCSC continues to investigate a large number of UK cyber incidents involving the Cobalt Strike framework. The number of such incidents handled by the NCSC has increased significantly in recent years. This includes both cyber criminals conducting financially-motivated attacks and cyber espionage…
The HC3 team originally sent an invitation for September 17th for the Monthly webinar. This has been moved to September 24th please reference the invitation below.
CIS Controls: • Provide a quick security win for the Healthcare and Public Health (HPH) Sector • They offer an initial starting point for execution of a cyber security strategy • They are scalable to meet the needs of the smallest to largest organizations • Execution of the initial 43 sub-controls…
The following webinar invite is a redistribution from partners at HHS-ASPR =================
Fifth generation cellular network technology (Officially called: 5G New Radio) adopted by 3rd Generation Partnership Project (3GPP) - international organization responsible for 3G UMTS and 4G LTE.
The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165, is deploying previously undisclosed malware for Linux® systems, called Drovorub, as part of its cyber espionage operations. GTsSS malicious cyber activity has previously been…