The Cybersecurity and Infrastructure Security Agency has expanded access to its Malware Next-Gen malware analysis service to organizations in the private sector months after it was offered to government and military workers, reports The Record, a news site by cybersecurity firm Recorded Future.
Malware Next-Gen — which was touted by CISA Executive Director for Cybersecurity Jen Easterly to bolster malware analysis effectiveness and efficiency, as well as support expedited cyber threat response efforts — could also enable the analysis of suspicious digital artifacts, according to CISA. However, analysis of the submitted samples could only be accessed by authorized users, with CISA warning that unauthorized system access could result in prohibition from using the service, as well as criminal and civil penalties.
CISA said that almost 200 malicious and suspicious documents and URLs have already been identified by its Malware Next-Gen system since its introduction in November, all of which have been provided as intelligence to the agency’s partners.
More than 2,100 servers may still be vulnerable to GitLab password reset exploits.
Vulnerability exploits, pure extortion and internal risks are on the rise, while AI threats fall short.
Microsoft recorded 1,228 security vulnerabilities in 2023, representing a 5% decline from the year prior and the steady prevalence of reported security issues since 2020, TechRepublic reports.
By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.
Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved.
This material may not be published, broadcast, rewritten or redistributed
in any form without prior authorization.
Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.