Russian forces have been observed converting the inexpensive Molniya family of FPV loitering munitions into a reconnaissance-capable platform — the Molniya‑2R — by combining stabilized long‑range optics, consumer‑grade satellite backhaul and a mix of commodity computing hardware, a development...
Amid growing concerns over open-source software security, a recent campaign targeting the npm ecosystem has underscored the persistent vulnerabilities in modern development pipelines. According to research by Socket’s Threat Research Team, a coordinated attack has seen at least 60 malicious npm...
Original release date: October 30, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques.
This joint cybersecurity advisory...
Original release date: July 1, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
This advisory—written by the...
anonymity
apt
cisa
command and control
cybersecurity
data exfiltration
data manipulation
denial of service
exploitation
fbi
incident response
indicators of compromise
malicious software
network monitoring
network security
reconnaissance
risk mitigation
security software
threat actors
tor
In the daring raid that killed Osama bin Laden, Navy Seals were likely outfitted with latest in high-tech weapons and gadgets; Fox News speculates on five key technologies that could have helped the highly trained members of Navy SEAL Team 6 successfully complete their mission including bomb...