<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DNS &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/dns/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Tue, 24 Nov 2020 08:14:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>DNS &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protecting from Ransomware Attacks with DNS</title>
		<link>https://risk-academy.ru/protecting-from-ransomware-attacks-with-dns/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 23 Nov 2020 21:07:46 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[crime]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Security breaches]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Ransomware Information Security Media Group]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/protecting-from-ransomware-attacks-with-dns/</guid>

					<description><![CDATA[Fraud Management &#38; Cybercrime , Ransomware Information Security Media Group • November 23, 2020     &#013; The session is focused on the ways DNS can be used to improve [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="generic-article">
<p class="text-muted">
                      Fraud Management &amp; Cybercrime<br />
                          ,<br />
                              Ransomware
                          </p>
<p>        <span class="article-byline"><br />
                        Information Security Media Group                           •<br />
            <span class="text-nowrap">November 23, 2020</span>     </span></p>
<figure>
        <img decoding="async" title="crime" src="https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/protecting-from-ransomware-attacks-dns-showcase_image-2-a-15400.jpg" alt="Protecting from Ransomware Attacks with DNS" class="img-responsive hidden" /><br />
              </figure>
<p>          &#013;</p>
<p>The session is focused on the ways DNS can be used to improve protection against ransomware campaigns and speed up investigations of such incidents. We will cover fresh tactics, techniques, and procedures (TTPs) used by ransomware actors which actively adopt advanced persistent threat (APT)-style tactics and evasion techniques.</p>
<p>&#013;</p>
<p> These actors’ goals have shifted from deploying ransomware on a few vulnerable machines to achieving persistence in the network and causing maximum damage to push victims into paying the ransom. </p>
<p>&#013;</p>
<p>We will share DNS-based classifiers developed by the Cisco&#8230;</p>
</div>
<p><a href="https://www.govinfosecurity.com/protecting-from-ransomware-attacks-dns-a-15400">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mercenaries for cyberespionage. ICS threats. IoT botnet in the cloud. Return of DNS cache poisoning? PLATYPUS, a new side-channel bug.</title>
		<link>https://risk-academy.ru/mercenaries-for-cyberespionage-ics-threats-iot-botnet-in-the-cloud-return-of-dns-cache-poisoning-platypus-a-new-side-channel-bug/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 13 Nov 2020 05:05:18 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[oil and gas]]></category>
		<category><![CDATA[aerospace]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[industrial control systems]]></category>
		<category><![CDATA[electric utilities]]></category>
		<category><![CDATA[aerospace sectors]]></category>
		<category><![CDATA[Persian Gulf]]></category>
		<category><![CDATA[oil and gas entities]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/mercenaries-for-cyberespionage-ics-threats-iot-botnet-in-the-cloud-return-of-dns-cache-poisoning-platypus-a-new-side-channel-bug/</guid>

					<description><![CDATA[BlackBerry researchers are tracking what they believe to be a mercenary cyberespionage group whose campaign they’re calling “CostaRicto.” BlackBerry doesn’t speculate about who CostaRicto&#8217;s paymasters might be, but they offer [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="summary-text1">
<p>BlackBerry researchers are tracking what they believe to be a mercenary cyberespionage group whose campaign they’re calling “CostaRicto.” BlackBerry doesn’t speculate about who CostaRicto&#8217;s paymasters might be, but they offer four reasons for thinking it a mercenary operation. It uses bespoke malware; it shows systematic, continual development; it may share some network infrastructure with APT28 (Fancy Bear, Russia’s GRU), and its highly diversified target list suggests more than one customer.</p>
<p>Dragos finds that industrial control systems (ICS) are increasingly being subjected to the attentions of cyber threat actors. The researchers are following five distinct threat groups:</p>
<ul>
<li>CHRYSENE (APT34 or Helix Kitten) targets the petrochemical, oil and gas, manufacturing, and electric generation sectors. It’s expanded its interests beyond the Persian Gulf.</li>
<li>MAGNALLIUM (APT33 or Elfin) is active against the energy and aerospace sectors, including their supporting sectors.</li>
<li>PARISITE (Fox Kitten or Pioneer Kitten) works against electric utilities, aerospace, manufacturing, oil and gas entities, and governmental and non-governmental organizations.</li>
<li>WASSONITE, associated with the Lazarus&#8230;</li>
</ul>
</div>
<p><a href="https://thecyberwire.com/newsletters/daily-briefing/9/219">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s My Priority? The Key Pillars of Threat Intelligence</title>
		<link>https://risk-academy.ru/whats-my-priority-the-key-pillars-of-threat-intelligence/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 29 Oct 2020 18:37:43 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[information technology]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[u.s. department of homeland security]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Why Is Spotting Threats More Complex]]></category>
		<category><![CDATA[certain application delivery systems]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/whats-my-priority-the-key-pillars-of-threat-intelligence/</guid>

					<description><![CDATA[Often, in the world of information security and risk management, the question facing threat intelligence teams is amidst this sea of vulnerability disclosures, which ones matter the most to my [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="single__height-calc">
<p><span class="">Often</span>, in the world of information security and risk management, the question facing threat intelligence teams is amidst this sea of vulnerability disclosures, which ones matter the most to my organization? Which can impact us the most? And, how do I best explain threats to internal stakeholders in a way that helps minimize risk?</p>
<p>Reducing risk through proper patch management is not always simple. Not all common vulnerabilities and exposures (CVEs) are equally important. In July 2020, for example, the U.S. Department of Homeland Security released multiple top-priority advisories. One covered known exploits against certain application delivery systems (CVE-2020-5902) and another covered detected vulnerabilities in a domain name system (DNS) server (CVE-2020-1350). While both are top priorities, how do they apply to the network you use? Which threats are the most likely to impact<em> your</em> core business?</p>
<p>To better answer this, we must be able to identify relevant threats before beginning to address patching or manage risks. Enter threat identification: a necessary process that has become increasingly complicated.</p>
<h2>Why Is Spotting Threats More Complex&#8230;</h2>
</div>
<p><a href="https://securityintelligence.com/posts/whats-my-priority-key-pillars-of-threat-intelligence-program/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beefing Up Third-Party Risk Management with Reverse DNS Search</title>
		<link>https://risk-academy.ru/beefing-up-third-party-risk-management-with-reverse-dns-search/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 18 Oct 2020 16:35:29 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Domain Name System]]></category>
		<category><![CDATA[Internet architecture]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Academic disciplines]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Internet Standards]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/beefing-up-third-party-risk-management-with-reverse-dns-search/</guid>

					<description><![CDATA[Most businesses rely on third-party entities to outsource certain functions, save on costs, and strengthen their cybersecurity capabilities. While working with external providers makes perfect business sense, it also poses [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Most businesses rely on third-party entities to outsource certain functions, save on costs, and strengthen their cybersecurity capabilities. While working with external providers makes perfect business sense, it also poses cyber risks. For instance, a global record label&#8217;s websites hosted by a third-party service provider became the latest victim of Magecart, a web skimming attack. The company is not alone to suffer such misfortune, however, as many data breaches are connected to third-party use.
</p>
<p>
Third parties usually need to access company networks and data to make these accessible to their contractors and employees. Hence, the chances of a data breach and other cybercrimes are magnified. But organizations can minimize risks through robust third-party risk management. As part of this, Reverse DNS Search can help by:
</p>
<ul>
<li>Identifying hosts and domains related to a third-party website, IP address, or DNS record</li>
<li>Determining if any of the domains associated with third parties are malicious and, therefore, pose risks</li>
</ul>
<p>
Let&#8217;s take a closer look.
</p>
<h4>Identify Domains Associated with a Third Party</h4>
<p>
Associations with malicious actors is among the telltale signs of third-party risk&#8230;.</p>
</div>
<p><a href="http://www.circleid.com/posts/20201014-beefing-up-third-party-risk-management-reverse-dns-search/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DataGrail: Mid-Year CCPA Trends Report 2020</title>
		<link>https://risk-academy.ru/datagrail-mid-year-ccpa-trends-report-2020/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 12:00:35 +0000</pubDate>
				<category><![CDATA[Блоги на английском]]></category>
		<category><![CDATA[Иностранные блоги]]></category>
		<category><![CDATA[Childhood Cancer Parents Alliance]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[DSR]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Social Issues]]></category>
		<category><![CDATA[Digital rights]]></category>
		<category><![CDATA[Internet privacy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[Catabolite Control Protein A]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/datagrail-mid-year-ccpa-trends-report-2020/</guid>

					<description><![CDATA[Privacy management company DataGrail analyzed how many CCPA data subject requests went across its platform in the first half of 2020 and found that organizations should expect to process hundreds [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Privacy management company DataGrail analyzed how many CCPA data subject requests went across its platform in the first half of 2020 and found that organizations should expect to process hundreds of CCPA data subject requests (DSRs), with do-not-sell requests being the most popular requests from consumers.</p>
<p>Highlights from the report include:</p>
<ul>
<li>Do-not-sell (DNS) requests are the most common type of DSR by 2x</li>
<li>One-third of every DSR will go unverified, confirming the need for a robust and scalable verification method</li>
<li>40 percent of access requests were NOT verified, validating concerns that fraudulent requests could be made to steal data</li>
<li>In 2020, companies manually processing DSRs should expect to pay $240,000 per one million records to fulfill requests</li>
<li>B2C companies should prepare to process approximately 170 total DSRs per one million consumer records each year</li>
</ul>
<p> </p>
<p><span class="highlight" style="background-color: #dd9933; color: #ffffff;">Download the report below to read the full findings.</span></p>
<p>
</div>
<p><a href="http://feedproxy.google.com/~r/CorporateComplianceInsights/~3/HXmbBIxzG2w/">Подробнее&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>More filtering by ISPs and cloud providers would benefit SMBs</title>
		<link>https://risk-academy.ru/more-filtering-by-isps-and-cloud-providers-would-benefit-smbs/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 27 Jul 2020 05:24:54 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Internet service provider]]></category>
		<category><![CDATA[Email sender accreditation]]></category>
		<category><![CDATA[public key infrastructure]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[spokesperson]]></category>
		<category><![CDATA[ZDNet]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Telstra]]></category>
		<category><![CDATA[SMBs Service]]></category>
		<category><![CDATA[malware communications]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/more-filtering-by-isps-and-cloud-providers-would-benefit-smbs/</guid>

					<description><![CDATA[Service providers are increasingly using ingress filtering to block access to vulnerable protocols on customers&#8217; devices or for blocking badly-routed data packets. In June, for example, Telstra started rolling out [&#8230;]]]></description>
										<content:encoded><![CDATA[<div data-component="lazyloadImages" data-lazyload-images-options="{" threshold="">
<p>Service providers are increasingly using ingress filtering to block access to vulnerable protocols on customers&#8217; devices or for blocking badly-routed data packets. </p>
<p>In June, for example, Telstra started rolling out Resource Public Key Infrastructure (RPKI) Route Origin Authorisations (ROAs) to certify the truth of routing messages transmitted by the Border Gateway Protocol (BGP). </p>
<p>The telco has since completed that deployment across all IP addresses in Autonomous System Number AS1221, and work is underway on AS4637. </p>
<p>&#8220;This basically means we have now deployed RPKI Origin Validation into Telstra&#8217;s domestic network &#8230; dropping invalids [incorrectly routed packets] from our upstream, peer and customer networks,&#8221; a Telstra spokesperson told ZDNet. </p>
<p>&#8220;Deployment activities continue in our International networks,&#8221; they said. </p>
<p>Telstra has also been working on its Cleaner Pipes initiative, which uses DNS filtering to block malware communications across its network. </p>
<p>Such active cyber defence programs have been gaining increasing support in Australia. </p>
<section class="sharethrough-top" data-component="medusaContentRecommendation" data-medusa-content-recommendation-options="{" promo="">
<p> &#8230;</section>
</div>
<p><a href="https://www.zdnet.com/article/more-filtering-by-isps-and-cloud-providers-would-benefit-smbs/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CISA gives agencies a day to remedy Windows DNS server vulnerability</title>
		<link>https://risk-academy.ru/cisa-gives-agencies-a-day-to-remedy-windows-dns-server-vulnerability/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 14:30:04 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Windows Servers]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Director]]></category>
		<category><![CDATA[Infrastructure Security Agency]]></category>
		<category><![CDATA[Microsoft Windows]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[operating system]]></category>
		<category><![CDATA[Chris Krebs]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cisa-gives-agencies-a-day-to-remedy-windows-dns-server-vulnerability/</guid>

					<description><![CDATA[Agencies face a quick turnaround to address a known vulnerability in Windows Domain Name System servers. The Cybersecurity and Infrastructure Security Agency, under an emergency directive, is giving agencies until [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Agencies face a quick turnaround to address a known vulnerability in Windows Domain Name System servers.</p>
<p>The Cybersecurity and Infrastructure Security Agency, under an emergency directive, is giving agencies until 2 p.m. Friday, July 17, to apply a patch released Tuesday — or a “temporary registry-based workaround” — for Windows Servers running DNS.</p>
<p>“CISA has determined that this vulnerability poses unacceptable significant risk to the federal civilian executive branch and requires an immediate and emergency action,” the agency wrote in its emergency directive.</p>
<p>CISA issued the emergency directive “based on the likelihood of the vulnerability being exploited, the widespread use of the affected software across the federal enterprise, the high potential for a compromise of agency information systems, and the grave impact of a successful compromise.”</p>
<figure id="attachment_2229743" style="width: 464px" class="wp-caption alignright"><img fetchpriority="high" decoding="async" title="Cybersecurity and Infrastructure Security Agency" src="https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs.png" class=" wp-image-2229743" alt="CISA" width="464" height="306" srcset="https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs.png 902w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-300x198.png 300w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-768x507.png 768w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-180x120.png 180w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-90x60.png 90w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-727x480.png 727w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-130x87.png 130w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-182x120.png 182w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-303x200.png 303w" sizes="(max-width: 464px) 100vw, 464px"/><noscript><img decoding="async" class=" wp-image-2229743" src="https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs.png" alt="CISA" width="464" height="306" srcset="https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs.png 902w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-300x198.png 300w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-768x507.png 768w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-180x120.png 180w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-90x60.png 90w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-727x480.png 727w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-130x87.png 130w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-182x120.png 182w, https://federalnewsnetwork.com/wp-content/uploads/2019/01/Chris-Krebs-303x200.png 303w" sizes="(max-width: 464px) 100vw, 464px"/></noscript><figcaption class="wp-caption-text">Chris Krebs is the director of CISA at DHS.</figcaption></figure>
<p>CISA Director Chris Krebs wrote in a separate blog post that this marks the third emergency directive he’s approved during his tenure.</p>
<p>In January, CISA required “emergency action” from agencies on Microsoft’s Windows operating system vulnerability, giving&#8230;</p>
</div>
<p><a href="https://federalnewsnetwork.com/cybersecurity/2020/07/cisa-gives-agencies-a-day-to-remedy-windows-dns-server-vulnerability/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
