Major cyberattack forces closure of clinics across Mississippi | CNN Politics

The closure affects all 35 of the University of Mississippi Medical Center’s health clinics, which provide a range of care to patients from cancer treatment to chronic-pain management. The attack also caused the cancelation of elective procedures in what health officials said would be a “multi-day event.”

US emergency alert systems down after cyberattack • The Register

Various municipalities have issued near-identical advisories about the attack on the OnSolve CodeRED platform, now owned by Crisis24, which enables residents to receive real-time alerts for emergencies such as weather warnings, missing children, terror threats, and more.

Pentests once a year? Nope. It’s time to build an offensive SOC

In the real world, adversaries don’t operate in bursts. Their recon is continuous, their tools and tactics are always evolving, and new vulnerabilities are often reverse-engineered into working exploits within hours of a patch release.

So, if your offensive validation isn’t just as dynamic, you’re not just lagging, you’re exposed.

Online scams easy as ever, as cybercrime markets flourish

Cybercriminals are often portrayed in popular media as rogue and highly skilled individuals, wielding coding and hacking abilities from a dimly lit room. But such stereotypes are becoming outdated. 

US Coast Guard paychecks delayed by cyberattack | TechRadar

A data breach has affected the personnel and payroll systems of the US Coast Guard, and has impacted member pay, and forced the agency to to take systems offline to prevent further intrusion until “at least February 19th, 2025”.

JPCERT shares Windows Event Log tips to detect ransomware attacks

The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.

How to manage shadow IT and reduce your attack surface

There is a reason why a lot of organizations shy away from people bringing their own devices to work. https://www.bleepingcomputer.com/news/security/how-to-manage-shadow-it-and-reduce-your-attack-surface/

Microsoft warns of ransomware attacks on US healthcare | CSO Online

The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.

The cyberattack cycle: First comes outage, next comes phishing

Threat Actors are quick to try to take advantage of tech issues, much in the same way “repair scammers” jump in after storms cause damage at homes. https://www.securityintelligence.com/news/cyberattack-cycle-first-outage-then-phishing/

Revolver Rabbit gang registers 500,000 domains for malware campaigns

A cybercriminal gang that researchers track as Revolver Rabbit has registered more than 500,000 domain names for infostealer campaigns that target Windows and macOS systems.