Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
APT40 Alert! Global Cyber Avengers Unite to Combat PRC State-Sponsored Hacks
CISA and ASD’s ACSC, alongside global partners, have released an advisory on PRC state-sponsored cyber group APT40. Known for targeting vulnerabilities in popular software, APT40’s exploits include Log4J and Microsoft Exchange. Organizations are urged to review the advisory and adopt Secure by Design principles to…
Hot Take:
When it takes a global village to tackle a cyber villain, you know the threat is real. APT40, aka “Kryptonite Panda,” is giving us all a crash course in why we need to be Secure by Design. And no, you can’t just throw a cape on and expect to save the day.
Key Points:
- CISA and ASD’s ACSC team up with global cyber agencies to release an advisory on APT40.
- APT40, also known as Kryptonite Panda, has a knack for targeting and exploiting vulnerabilities.
- The advisory is based on current incident response investigations led by ACSC.
- Organizations are urged to adopt Secure by Design principles to fend off APT40’s threats.
- More detailed information can be found on CISA’s website.