CISA Issues Updated RESURGE Malware Analysis Highlighting a Stealthy but Active Threat

Original Post: https://www.cisa.gov/news-events/news/cisa-issues-updated-resurge-malware-analysis-highlighting-stealthy-active-threat Released: February 26, 2026 New Findings Reveal Malware’s Ability to Remain Dormant and Undetected on Ivanti Connect Secure Devices WASHINGTON – The Cybersecurity and Infrastructure Security Agency today released an updated Malware Analysis Report (MAR) revealing new findings on RESURGE,

Posted in CISA.gov, Cybersecurity, ISC2 Aberdeen, Uncategorized

ICS Advisory: Honeywell CCTV Products

Original Post: https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-04 Release Date: February 17, 2026 | Alert Code: ICSA-26-048-04 Summary Successful exploitation of this vulnerability could lead to account takeovers and unauthorized access to camera feeds; an unauthenticated attacker may change the recovery email address, potentially leading

Posted in CISA.gov, Cybersecurity, ISC2 Aberdeen, Uncategorized

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps

Original Post: https://www.cisa.gov/news-events/alerts/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps Release Date: February 10, 2026 The purpose of this Alert is to amplify Poland’s Computer Emergency Response Team (CERT Polska’s) Energy Sector Incident Report published on Jan. 30, 2026, and highlight key mitigations for Energy Sector stakeholders. 

Posted in CISA.gov, Cybersecurity, ISC2 Aberdeen

How to Pivot in Your Cyber Career

Original Post: https://youtu.be/Gr_PUvz6oZM?si=SJo_jF8gjXa-2ruD Original Post: https://youtu.be/Gr_PUvz6oZM?si=SJo_jF8gjXa-2ruD

Posted in Cybersecurity, ISC2 Aberdeen, ISC2.org, Membership

CISA Adds Four Known Exploited Vulnerabilities to Catalog

Original Post: https://www.cisa.gov/news-events/alerts/2026/02/03/cisa-adds-four-known-exploited-vulnerabilities-catalog Release Date: February 03, 2026 CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the

Posted in CISA.gov, Cybersecurity, ISC2 Aberdeen
Upcoming Events

No upcoming events

Calendar
March 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
Follow Blog via Email

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 52 other subscribers