“The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond,” the FBI said. “We have nothing additional to respond.”Neither the FBI statement nor the notification identified who might be responsible for the incident, but the bureau and other federal agencies have long been targets of foreign hackers seeking to spy on sensitive operations and decision-making.In this instance, the FBI said, the techniques being used were “sophisticated” and included leveraging a commercial internet service provider vendor’s infrastructure to exploit FBI network security controls.
Neither the FBI statement nor the notification identified who might be responsible for the incident, but the bureau and other federal agencies have long been targets of foreign hackers seeking to spy on sensitive operations and decision-making.In this instance, the FBI said, the techniques being used were “sophisticated” and included leveraging a commercial internet service provider vendor’s infrastructure to exploit FBI network security controls.
In this instance, the FBI said, the techniques being used were “sophisticated” and included leveraging a commercial internet service provider vendor’s infrastructure to exploit FBI network security controls.
Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.
Join the event where top security experts unpack the biggest software supply chain risks.
ArmorCode has named Phil Venables to its Board of Directors.
James ‘Aaron’ Bishop has been appointed as new Pentagon CISO.
Sonalee Parekh has joined SentinelOne as Chief Financial Officer.
The goal isn’t about preventing every attack but about keeping the business running when attacks succeed.(Steve Durbin)
Developers must view AI as a collaborator to be closely monitored, rather than an autonomous entity to be unleashed. Without such a mindset, crippling tech debt is inevitable.(Matias Madou)
Source: SecurityWeek