You are here

Cybersecurity

(TLP:CLEAR) Recorded Future’s 2024 Threat Analysis and 2025 Predictions

Summary: In 2024, two key trends defined the cybersecurity landscape: the resilience of cybercriminal networks despite law enforcement actions and the growing complexity of enterprise attack surfaces. In addition, state-sponsored threat actors, primarily linked to China and Russia, intensified their focus on critical infrastructure and leveraged generative AI to conduct influence operations to advance their geopolitical objectives. Recorded Future’s just-released threat report explores these trends and more.

(TLP:CLEAR) Forescout’s 2024 Global Threat Roundup

Summary: Forescout Technologies recently released their 2024 Threat Report which looked back at 900 million attacks observed in the threat landscape of 2024, up 114 percent from last year’s 420 million attacks. The report includes key findings related to OT/ICS infrastructure and offers strategic recommendations for improved defense in 2025 in the recommended mitigation section.

House Committee Hearing – Unconstrained Actors: Assessing Global Cyber Threats to the Homeland

During the House Committee Hearing held yesterday, four witnesses addressed the escalating threats posed by nation-state actors, particularly from the People’s Republic of China (PRC). They highlighted the increased sophistication and operational capabilities of these threat actors and noted a rise in cyber intrusions targeting U.S. critical infrastructure. Witnesses also cited recent incidents at water utilities.

Cyber Resilience – Tenable Analysis of Salt Typhoon and Exploited Vulnerabilities

Cybersecurity firm Tenable recently released an analysis of People’s Republic of China’s (PRC)-affiliated threat actor Salt Typhoon and examines the vulnerabilities and tactics employed by the group. Salt Typhoon has infiltrated at least nine U.S.-based telecommunications companies and has utilized various tactics, primarily exploiting vulnerabilities, to gain access.

Vulnerability Awareness – Joint Advisory on Ivanti Exploit Chains by Suspected Chinese Threat Actors

Yesterday, CISA and the FBI released a joint advisory that included technical details of at least two exploit chains used by threat actors to break into Ivanti Cloud Service Appliances (CSA). The advisory comes in response to active exploitation in Ivanti CSA of the following vulnerabilities:

Pages

Subscribe to Cybersecurity