Cyware Monthly Threat Intelligence
Monthly Threat Briefing • Apr 11, 2024
We use cookies to improve your experience. Do you accept?
Monthly Threat Briefing • Apr 11, 2024
Revolutionizing cybersecurity with innovative and adaptive measures, the Pentagon unveiled the first-ever strategy to protect the defense industrial base from cyber threats, emphasizing resilience and cooperation to defend critical infrastructure. Meanwhile, GitHub activated default push protection for public repositories to prevent accidental secret leaks online. Also, learn about the new 911 Cybersecurity Resource Hub by the CISA, SAFECOM, and NCSWIC, for Emergency Communications Centers (ECCs) across the country.
The Pentagon released its first cybersecurity strategy aimed at protecting the defense industrial base from cyberattacks. The strategy outlines goals and objectives to enhance cybersecurity and resilience within the supply chain, which consists of numerous entities contracting directly with the Pentagon. This initiative includes the Cybersecurity Maturity Model Certification program to raise standards among contractors.
The CISA, in collaboration with SAFECOM and NCSWIC, launched the 911 Cybersecurity Resource Hub. This initiative aims to provide ECCs across the nation with comprehensive cybersecurity resources to address their multifaceted cybersecurity needs. The hub serves as a centralized repository, streamlining access to essential resources and expertise sourced from federal agencies, industry partners, academia, and the private sector.
GitHub is implementing push protection as the default for all public repositories to prevent accidental leakage of secrets like API keys and tokens. The feature scans code commits for secrets and alerts developers if any are found. It has detected over one million leaked secrets this year alone. The feature supports over 200 token types and patterns from 180 service providers.
The emergence of new cyber threats continued with SentinelOne discovering AcidPour, a Linux x86 variant of AcidRain. Meet a new PhaaS program dubbed Darcula that exploited over 20,000 domains for credential theft. Additionally, ESET unveiled a cyberespionage campaign by Evasive Panda targeting Tibetans. Amidst evolving spyware tactics, Insikt Group found Predator spyware infrastructure spanning 11 countries.