US-CERTOvjeren akaunt

@USCERT_gov

Part of , we respond to major incidents, analyze threats, and exchange critical cybersecurity information with partners around the world.

Washington, DC
Vrijeme pridruživanja: prosinac 2008.

tweetova

Blokirali ste korisnika/cu @USCERT_gov

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @USCERT_gov

  1. proslijedio/la je Tweet
    prije 3 sata

    🚨All orgs should upgrade to log4j version 2.15.0 or apply appropriate vendor recommended mitigations ASAP!

Read my full statement on this vulnerability:

    Poništi
  2. proslijedio/la je Tweet

    We urge all organizations to review the latest current activity alert and upgrade to Log4j version 2.15.0, or apply the appropriate vendor recommended mitigations immediately:

    Prikaži ovu nit razgovora
    Poništi
  3. 10. pro

    . has added 13 new vulnerabilities to its catalog of known exploited vulnerabilities that FCEB agencies must mitigate, including Apache Log4j (CVE-2021-44228). Read more at

    Poništi
  4. 10. pro

    CISA has released a security advisory detailing a vulnerability in Hillrom Welch Allyn cardiology products. .

    Poništi
  5. 10. pro

    Upgrade ASAP to protect yourself from the vulnerability, CVE-2021-44228, affecting Apache Log4j. Read more at

    Poništi
  6. proslijedio/la je Tweet
    10. pro

    experts respond to ransomware attacks every day. Deputy Assistant Director Tonya Ugoretz of the FBI's Cyber Division recently told Jeff Pegues of 's how the FBI and our partners can help victims who report attacks.

    Poništi
  7. 10. pro

    The holiday season is a prime time for malicious cyber actors to target organizations with key personnel out of the office. wants to remind organizations to review, update & revisit cyber resilience plans to prepare for potential .

    Prikaži ovu nit razgovora
    Poništi
  8. 10. pro

    💡 Ensure your IT department is continuously patching software vulnerabilities, detecting & mitigating cyber threats, and educating employees on how to detect potential malicious cyber incidents.

    Prikaži ovu nit razgovora
    Poništi
  9. proslijedio/la je Tweet
    7. pro

    Attention, network defenders! The and warn that advanced persistent threat actors have exploited a vulnerability in ManageEngine ServiceDesk Plus, a help desk software. Visit to read our joint cybersecurity advisory about this threat.

    Poništi
  10. 9. pro

    Cisco has released a security advisory to address products affected by multiple vulnerabilities in Apache HTTP Server 2.4.48 and earlier releases. Learn more at and apply the necessary updates.

    Poništi
  11. 9. pro

    📋 Plan regular exercises to test your incident response, communications, and crisis plans. Review what worked and what didn’t, then update and adjust areas that need improvement. See ’s recent playbooks for additional info.

    Poništi
  12. proslijedio/la je Tweet

    We're live! First up, with remarks about this year's competition. Join us for the final round coverage:

    Poništi
  13. 9. pro

    Social media accounts provide rapid outreach for organizations, which is why it’s important that only you have account access. Review ’s tips on how to protect your accounts:

    Poništi
  14. proslijedio/la je Tweet

    The Finals of the President's Cup Cybersecurity Competition is today! Watch the top cybersecurity talent in the federal workforce compete live at

    Poništi
  15. proslijedio/la je Tweet
    8. pro
    Poništi
  16. 8. pro
    Poništi
  17. 8. pro

    ☑️ Sign up for Current Activity alerts TODAY and receive breaking information about the latest news, analysis reports, tips, vulnerabilities, and emerging threats from our expert analysts.

    Poništi
  18. 8. pro

    Update SonicWall SMA 100 series products ASAP to protect yourself from newly identified vulnerabilities, including an vulnerability.

    Poništi
  19. 8. pro

    Mozilla has released security updates for multiple products. Read more and update now at .

    Poništi
  20. proslijedio/la je Tweet
    7. pro

    Do you know the answer to this week's trivia question? We'll share the answer tomorrow! ➡️What are the names of fraud schemes, which criminals use to elicit 💵, credit card & personally identifiable info, or install malware on electronic devices?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·