Search Results

The default setting for search results displays All Content. If you prefer to see recent content only, please adjust the date filter.

4 Results Found

Getting Ready for Post-Quantum Cryptography

William Barker Dakota Consulting Gaithersburg, MD William Polk Applied Cybersecurity Division Information Technology Laboratory
Member

Theft of Intellectual Property: Threats to Medical Research and Innovation

In this members-only white paper by the AHA Center for Health Innovation, John Riggi, senior adviser for cybersecurity and risk at the AHA, and Edward You, supervisory special agent for weapons of mass destruction at the FBI, outline growing concern among the FBI, Congress and some health care leaders about the theft of U.S. medical research intellectual property by foreign governments. Recently the Senate Finance Committee held a hearing on foreign threats to taxpayer-funded research.
Public

FBI Alert: TPL White: Increased Number of Emotet Command and Control IP Addresses Identified

In early June 2019, Emotet, an advanced modular banking Trojan, attempted to communicate with 214 command and control (C2) IP addresses for initial instructions, indicating cyber actors recently made modifications or updates to Emotet malware or infrastructure. Immediately following, the Emotet malware ceased communication with the previously known C2 IP addresses.
Public

DejaBlue-High Risk Windows Vulnerability Whitepaper

As a follow-up to our June 6, 2019 white paper on BlueKeep, this report documents a recent alert from Microsoft concerning two similar remote desktop protocol (RDP) vulnerabilities, entitled BlueKeep 2 and BlueKeep 3, together dubbed “DejaBlue.”