News

CyberScoop
cyberscoop.com > cisa-warning-russian-cyberattack-poland-power-grid

After major Poland energy grid cyberattack, CISA issues warning to U.S. audience

After major Poland energy grid cyberattack, CISA issues warning to U.S. audience1+ hour, 38+ min ago   (285+ words) A recent attempt at a destructive cyberattack on Poland's power grid has prompted the Cybersecurity and Infrastructure Security Agency to publish a warning for U.S. critical infrastructure owners and operators. CISA said its warning was meant to "amplify" that Polish report....

CyberScoop
cyberscoop.com > ivanti-zero-day-vulnerabilities-netherlands-european-commission-shadowserver

Fallout from latest Ivanti zero-days spreads to nearly 100 victims

Fallout from latest Ivanti zero-days spreads to nearly 100 victims1+ day, 12+ min ago   (520+ words) Ivanti customers, including major government agencies, face mounting pressure as attackers expand their scope of targets to exploit a pair of vulnerabilities the vendor disclosed last week after in-the-wild attacks already occurred." The attacks were publicly disclosed as researchers and…...

CyberScoop
cyberscoop.com > radio > ai-is-reshaping-cybersecurity-faster-than-most-organizations-can-govern-it-and-the-risk-no-longer-stops-at-the-edge-of-the-enterprise

What leaders can learn from the WEF's Cybersecurity Outlook

What leaders can learn from the WEF's Cybersecurity Outlook4+ day, 23+ hour ago   (118+ words) Greg speaks with Brian Dye, CEO of Corelight, about the World Economic Forum's Global Cybersecurity Outlook 2026 AI is reshaping cybersecurity faster than most organizations can govern it'and the risk no longer stops at the edge of the enterprise. In this…...

CyberScoop
cyberscoop.com > cisa-bod-directive-unsupported-edge-devices-firewalls-routers

CISA tells agencies to stop using unsupported edge devices

CISA tells agencies to stop using unsupported edge devices5+ day, 4+ hour ago   (357+ words) It's a stab at tackling one of the most persistent and difficult-to-manage avenues of attack for hackers, a vector that has factored into some of the most consequential and most common types of exploits in recent years. New edge-device vulnerabilities…...

CyberScoop
cyberscoop.com > ivanti-endpoint-manager-mobile-zero-day-vulnerabilities-exploit

Ivanti’s EPMM is under active attack, thanks to two critical zero-days

Ivanti’s EPMM is under active attack, thanks to two critical zero-days1+ week, 1+ hour ago   (773+ words) Attackers are again focusing on a familiar target in the network edge space, actively exploiting two critical zero-day vulnerabilities in Ivanti software that allows administrators to set mobile device and application controls." The vulnerabilities " CVE-2026-1281 and CVE-2026-1340 " each carry a…...

CyberScoop
cyberscoop.com > china-espionage-group-lotus-blossom-attacks-notepad

China-based espionage group compromised Notepad++ for six months

China-based espionage group compromised Notepad++ for six months1+ week, 1+ day ago   (424+ words) A China-based threat group operating for almost two decades broke into the internal systems of Notepad++, an extremely popular open source-code editor, to spy on a select group of targeted users, researchers at Rapid7 said Monday. The Chinese APT group Lotus…...

CyberScoop
cyberscoop.com > move-fast-break-things-cybersecurity-supply-chain-security-op-ed

Why 'move fast and break things' is driving supply-chain cyber risk

Why 'move fast and break things' is driving supply-chain cyber risk1+ week, 1+ day ago   (288+ words) But Zuckerberg's call was heard well beyond Facebook's offices. The tech industry has embraced the philosophy for close to two decades, with benefits that are visible all around us: from Tik-Tok influencers, to contactless mobile payments, self-driving taxis, and AI-powered…...

CyberScoop
cyberscoop.com > ipidea-proxy-network-disrupted-google-lumen

Google's disruption rips millions out of devices out of malicious network

Google's disruption rips millions out of devices out of malicious network1+ week, 4+ day ago   (586+ words) Google's action, aided by Cloudflare, Lumen's Black Lotus Labs and Spur, impaired some of IPIDEA's proxy infrastructure, but not all of it. The coordinated strikes against malicious infrastructure underscore the back-and-forth struggle threat hunters confront when they take out pieces…...

CyberScoop
cyberscoop.com > radio > we-discuss-what-this-pattern-says-about-the-ot-threat-landscape-in-2025-from-remote-access-and-trust-boundaries-to-engineering-workflows-and-data-integrity-risk

Opportunistic by Default: How OT gets pulled into the blast radius

Opportunistic by Default: How OT gets pulled into the blast radius1+ week, 4+ day ago   (117+ words) Opportunistic by Default: How OT gets pulled into the blast radius'CyberScoop In this episode of Safe Mode, we look at how opportunistic campaigns'often starting as loud disruption like DDoS'can probe for weak points and, in some cases, move closer to…...

CyberScoop
cyberscoop.com > secret-service-iana-domain-security-weakness

Why the domain registration system is a major security threat, according to Secret Service

Why the domain registration system is a major security threat, according to Secret Service1+ week, 5+ day ago   (366+ words) The internet domain registration system is a major weakness that malicious hackers can exploit, but is often being overlooked, a senior Secret Service official said Thursday. "It is staggering to me that we live in a world where domain registrars…...