On December 13, 2023, Lumen’s Black Lotus Labs reported our findings on the KV-botnet, a covert data transfer network used by state-sponsored actors based in China to conduct espionage and intelligence activities targeting U.S. critical infrastructure.| Lumen Blog
Top threats, attacker trends and malware from the past year Our report includes a full breakdown of the current threat landscape, including actor trends with a specific focus on China, Russia and Middle East-based APTs. Download now Ransomware group LockBit accounts for more than a quarter of the total number| Cisco Talos Blog
Learn about the threats and risks associated with network infrastructure devices and how you can protect your network from cyber-attacks.| Cybersecurity and Infrastructure Security Agency CISA
The Center for Cybersecurity Policy and Law is building a new industry coalition called the Network Resilience Coalition which will focus on increasing the resilience of network hardware and software.| www.centerforcybersecuritypolicy.org
Executive Summary| Cybersecurity and Infrastructure Security Agency CISA
Cisco has identified active exploitation of two previously unknown vulnerabilities in the Web User Interface (Web UI) feature of Cisco IOS XE software — CVE-2023-20198 and CVE-2023-20273 — when exposed to the internet or untrusted networks.| Cisco Talos Blog
This campaign, dubbed "Jaguar Tooth," is an example of a much broader trend of sophisticated adversaries targeting networking infrastructure to advance espionage objectives or pre-position for future destructive activity.| Cisco Talos Blog