Government Technology reports that Maryland has introduced a new information sharing and analysis center in an effort to bolster state government organizations' fight against possible cyberattacks.
Numerous cyber threat intelligence analysts will be part of the MD-ISAC, which will curating information to provide more actionable insights in combating cyber threats against the state and its local government partners, compared with outdated threat intelligence bulletins, according to Maryland Chief Information Security Officer Chip Stewart.
"The approach that weve taken is to be proactive in finding the holes and tools that cybercriminals could use to launch a successful attack and then working to close those doors before they have the opportunity to exploit it," said Stewart in a press statement.
Maryland has been seeking counties, cities, towns, public school systems, and other local government agencies to join the effort, with inquiries possible through the [email protected] email address.
Numerous government, political, and academic organizations in South Korea have been targeted by the Chinese state-backed advanced persistent threat operation TAG-74 as part of a "multi-year" cyberespionage campaign part of China's intellectual property theft and influence operations, The Hacker News reports.
BleepingComputer reports that vulnerable Openfire messaging servers impacted by the already addressed high-severity authentication bypass flaw, tracked as CVE-2023-32315, are being subjected to ongoing attacks aimed at ransomware encryption and cryptominer distribution.
Ukraine's Prosecutor General's Office and other departments involved in war crimes documentation have been facing mounting cyberattacks from Russian state-sponsored threat operations looking to obtain evidence regarding such crimes, which is a sharp contrast from the previous targeting of energy facilities, Reuters reports.