Sept. 6, 2023, 5:20 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Welcome to the latest edition of the Below the Surface Threat Report. In this report we will cover a diverse range of threats and vulnerabilities tied to the IT supply chain. We’ll look at evolving threats to Network Infrastructure, as well as vulnerabilities found in proprietary cryptographic algorithms used in LE, DoD and critical infrastructure. When it comes to ransomware and criminal actors, we’ll look at how incidents affecting the IT supply chain are rapidly resulting in material impact and …

algorithms critical critical infrastructure cryptographic cryptographic algorithms dod evolving threats found infrastructure latest network network infrastructure report summer supply supply chain threat threat report threats threats and vulnerabilities vulnerabilities

Cybersecurity Consultant

@ Devoteam | Cité Mahrajène, Tunisia

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Phoenix, AZ, United States

(Senior) Director of Information Governance, Risk, and Compliance

@ SIXT | Munich, Germany

Information System Security Engineer

@ Space Dynamics Laboratory | North Logan, UT

Intelligence Specialist (Threat/DCO) - Level 3

@ Constellation Technologies | Fort Meade, MD

Cybersecurity GRC Specialist (On-site)

@ EnerSys | Reading, PA, US, 19605