User Overview

Followers and Following

Followers
Following
Trendsmap

History

Total Followers - Last Year
Daily Follower Change - Last Year
Daily Tweets - Last Year

Tweet Stats

Analysed 61 tweets, tweets from the last 33 weeks.
Tweets Day of Week (UTC)
Tweets Hour of Day (UTC)
Key:
Tweets
Retweets
Quotes
Replies
Tweets Day and Hour Heatmap (UTC)

Tweets

Last 50 tweets from @NSACyber
NSA Cyber Retweeted ·  
In April we issued an alert to address Pulse Connect Secure product vulnerabilities.

Today, we updated the alert to include additional guidance to detect exploitation and combat efforts to obfuscate intrusions: go.usa.gov/x6aeZ
 
NSA will play an important role in implementing the requirements of the Executive Order on cybersecurity recently signed by President Biden
Read more about how here: nsa.gov/News-Features/…
NSAs Role in the Presidents Cyber Executive Order
nsa.gov
 
NSA Cyber Retweeted ·  
🚨 We have released eviction guidance related to the ongoing SolarWinds Orion incident and related campaign activities affecting U.S. government agency networks, CI entities, and private sector organizations.

View our updated guidance: go.usa.gov/xHHFv
 
NSA recently collaborated with Morgan State University on how to use Ghidra to mitigate #cyber vulnerabilities that exist in smart cars. Discover more: nsa.gov/News-Features/…
 
Today, we released our Potential Threat Vectors to 5G Infrastructure analysis paper with our partners @ODNIgov, @CISAgov & industry to enhance understanding of risks introduced by #5G.

Learn more here: nsa.gov/news-features/…
NSA, ODNI and CISA Release 5G Analysis Paper
nsa.gov
 
Russian SVR continues leveraging publicly known vulnerabilities—including recently released CVEs—for its cyber activities. Read our joint @NCSC, @CISAgov, and @FBI advisory on how to detect and mitigate this and other techniques the SVR has been using.
ncsc.gov.uk/files/Advisory…
 
NSA Cyber Retweeted ·  
Ivanti has released security updates for Pulse Connect Secure. Learn more at go.usa.gov/xHVB8. #Cybersecurity #Infosec
 
#OperationalTechnology owners and operators will benefit from our recent #Cybersecurity Advisory on how to evaluate risks to their systems & make informed decisions to prevent and detect malicious activities. Review the pragmatic evaluation methodology: nsa.gov/News-Features/…
 
NSA Cyber Retweeted ·  
🚨 We issued Emergency Directive 21-03 in response to known Pulse Connect Secure vulnerabilities. Federal departments & agencies must run the Pulse Connect Secure Integrity Tool to determine whether any PCS files have been maliciously modified or added: cisa.gov/news/2021/04/2…
 
NSA Cyber Retweeted ·  
.@CISAgov, @FBI, @CNMF_CyberAlert link Russian SVR/APT 29 actors to network infiltration through #SolarWinds supply chain compromise and GoldenSAML exploitation of M365. Read the report here: us-cert.cisa.gov/ncas/analysis-…
 
Russian Foreign Intelligence Service (SVR) cyber actors are exploiting five publicly known vulnerabilities to target U.S. and allied critical networks. Review our joint #cybersecurity guidance with @CISAgov and @FBI and apply the mitigations to stop them: nsa.gov/News-Features/…
 
NSA Cyber Retweeted ·  
Just Released: We issued supplemental direction v2 to Emergency Directive (ED) 21-02 which requires federal agencies to apply the Windows Server April 2021 security update to all affected Exchange Servers. Learn more: go.usa.gov/xHjgm #InfoSec #InfoSecurity
 
NSA urges applying critical Microsoft patches released today, as exploitation of these #vulnerabilities could allow persistent access and control of enterprise networks.
msrc-blog.microsoft.com/2021/04/13/apr…
 
NSA Cyber Retweeted ·  
Last week, Rob Joyce officially started his new position as our Director of Cybersecurity. He brings with him a wealth of knowledge from across the U.S. Government and we are excited to have his expertise on our team. Read more: nsa.gov/News-Features/…
Rob Joyce begins as NSAs Director of Cybersecurity
nsa.gov
 
Our Commercial Solution for Classified program delivers commercial monitoring & protection of devices accessing secure enterprise services over wireless networks within classified spaces by using WIDS & WIPS.
Read more: nsa.gov/Resources/Comm…
 
In the first session of the #NSACyberSpeakerSeries, host Dr. Josiah Dykstra speaks with Lieutenant Zachary Dannelly, United States Navy, on the effective use of Protective DNS.

View it here: youtu.be/ulWBclj3zDc
 
Tomorrow, our first #NSACyberSpeakerSeries video will be going live. The video will expand on the effective use of Protective DNS from our recent cybersecurity product. nsa.gov/News-Features/…
 
NSA Cyber Retweeted ·  
Was your organization impacted by the SolarWinds and Active Directory/M365 compromise? Or is your organization not sure if it was compromised?

Use CHIRP – our new program designed to help network defenders find indicators of compromise: go.usa.gov/xss4e
 
Microsoft has released a powershell script for deploying critical #mitigations related to the Microsoft Exchange Vulnerabilities. If network defenders can't patch in a timely fashion, use the released script to shrink the attack surface.

View the script: msrc-blog.microsoft.com/2021/03/05/mic…
Replying to @NSACyber
Detection is also critical in attempting to secure your system. You can find #detection signatures here: github.com/microsoft/CSS-…
 
Microsoft has released a powershell script for deploying critical #mitigations related to the Microsoft Exchange Vulnerabilities. If network defenders can't patch in a timely fashion, use the released script to shrink the attack surface.

View the script: msrc-blog.microsoft.com/2021/03/05/mic…
 
NSA Cyber Retweeted ·  
All organizations should take steps to remediate the observed vulnerabilities with Microsoft Exchange on-premises products. This includes hybrid configurations where Exchange servers are located on networks but are pushing data to O365 cloud environments: cisa.gov/ed2102
 
As seen in recently patched Microsoft Exchange vulnerability exploits, malicious cyber actors continue using web shells for data exfil and other actions on victim networks. Protect against this by #patching & applying mitigations in our web shell guidance: media.defense.gov/2020/Jun/09/20…
 
NSA Cyber Retweeted ·  
DNS, or the Domain Name System, is a key component of the internet's resilience. It can also be central to yours.

Along with @NSAcyber, we’ve shared tips on selecting a protective DNS service to block potential malicious activity: go.usa.gov/xsQys
 
Protective Domain Name System (PDNS) leverages threat feeds to identify and block connections to known malicious domains. Our recent joint report with @CISAgov details the benefits of PDNS, capabilities to consider, and effective implementation. Read more: nsa.gov/News-Features/…
 
Multiple zero-day exploits of Microsoft Exchange Server require immediate action. Check for reported IOCs and apply critical patches here: microsoft.com/security/blog/…
 
Zero Trust assumes all users, devices, and network components to be untrusted until verified as legitimate. For more on how #ZeroTrust can enhance your organization’s security, review our latest #cybersecurity release: nsa.gov/News-Features/…
NSA Issues Guidance on Zero Trust Security Model
nsa.gov
 
NSA Cyber Retweeted ·  
One of the world’s most dangerous malware botnet #Emotet disrupted in international cyber operation

@USAO_MDNC @FBI @FBICharlotte @Europol @Eurojust @bka @PolitieLE @GStA_FFM_ZIT

justice.gov/opa/pr/emotet-…
 
NSA Cyber Retweeted ·  
We are pleased to announce Rob Joyce as our next @NSACyber Director and are excited about the expertise he brings to continue the #cybersecurity mission!
 
Today’s #cybersecurity release recommends how enterprises can adopt the encrypted DNS protocol DoH without sacrificing security control. Network owners and admins must understand the benefits/risks before adopting. Read more: nsa.gov/News-Features/…
 
NSA Cyber Retweeted ·  
Congratulations to Anne Neuberger, whose selection to the National Security Council is a testament to the cybersecurity and technology expertise found in the halls of NSA. We look forward to working with her as she continues her government service. buildbackbetter.gov/press-releases…
 
NSA Cyber Retweeted ·  
🚨🚨🚨
@CISAgov has released a new Alert on post-compromise threat activity in Microsoft cloud environments and tools that can help detect this activity. Read more: go.usa.gov/xAnnF.
#Cybersecurity #Infosec #SolarWinds #Sparrow #Software
 
In October 2019, @NSAGov established a directorate dedicated to preventing and eradicting cyber threats in support of our #cybersecurity mission. Our #YearInReview outlines key milestones and mission outcomes achieved. nsa.gov/News-Features/…
 
NSA Cyber Retweeted ·  
🚨 New: We issued V3 supplemental guidance to Emergency Directive 21-01: cyber.dhs.gov/ed/21-01/#supp…

V3 includes an update on affected versions, guidance on the SolarWinds Orion platform, more clarity on required actions, & guidance for agencies using third-party service providers.
 
NSA Cyber Retweeted ·  
Hack the Army 3.0 officially begins! Today HackerOne and the Defense Digital Service announced their 11th bug bounty challenge together. Get the full story at hackerone.com/press-release/… @Hacker0x01 @DefenseDigital #bugbounty #hackthearmy
 
Our latest #cybersecurity product helps sys admins #detect and replace outdated TLS encryption protocol implementations with updated configurations to ensure data is being effectively protected. Read more: nsa.gov/News-Features/…
 
Important updates from our partners at @CISAgov:
We issued V2 supplemental guidance to Emergency Directive 21-01. @NSAgov verified version 2020.2.1 HF2 of SolarWinds Orion eliminates previously identified malicious code. Agencies using non-affected versions must update to the new version: cyber.dhs.gov/ed/21-01/#supp… pic.twitter.com/xdbSM9U3Oo
 
#Ghidra 9.2.1 has been released! Visit ghidra-sre.org to download a copy.
 
NSA Cyber Retweeted ·  
“Thanks to the cybersecurity experts in organizations like @WHNSC, @CISAgov, @FBI, @ODNIgov, @NSACyber, and across the entire government during this holiday season. Our entire country thanks you for your quick and diligent response to the recent cyber incidents.” - NSA O’Brien
 
If malicious cyber actors gain initial access to networks through the #SolarWinds compromise, the TTPs noted in our advisory may be used to forge credentials and maintain persistent access. Our guidance helps detect and mitigate against this, no matter the initial access method.
Malicious cyber actors are using two sets of #TTPs to access protected data in the #cloud. Detect and mitigate against this activity by reviewing our latest #cybersecurity advisory: nsa.gov/News-Features/… pic.twitter.com/qb6oYXaPha
 
Malicious cyber actors are using two sets of #TTPs to access protected data in the #cloud. Detect and mitigate against this activity by reviewing our latest #cybersecurity advisory: nsa.gov/News-Features/…
 
Today our #Ghidra team pushed a preview debugger on @GitHub. #Developers and testers, check out this long awaited feature: github.com/NationalSecuri…
NationalSecurityAgency/ghidra
github.com
 
Actors are forging SAML authentication to access protected data in the cloud. @msftsecresponse has observed similar techniques and additional TTPs. Visit their blog for more countermeasures: blogs.microsoft.com/on-the-issues/…
 
This incident should be treated as serious and stakeholders should take immediate action. For indicators of compromise and how to #detect the #sunburst malware, visit the @FireEye blog: fireeye.com/blog/threat-re…
“The NSC is working closely with @CISAgov, @FBI, the intelligence community, and affected departments and agencies to coordinate a swift and effective whole-of-government recovery and response to the recent compromise.” – NSC spokesman John Ullyot
 
NSA Cyber Retweeted ·  
Last night we issued an emergency directive to mitigate the compromise involving SolarWinds Orion products: cisa.gov/news/2020/12/1…. We urge all our partners—in the public & private sectors—to assess their exposure to this compromise and to secure their networks.
 
FireEye’s blog addressing unauthorized access to their Red Team’s tools and techniques—which include leveraging well known CVEs—underscores the need to #patch. Protect your systems, review FireEye’s GitHub repository to #detect and counter these threats: github.com/fireeye/red_te…
Replying to @NSACyber
Additional mitigation guidance for many of the CVEs are also available on our website: nsa.gov/What-We-Do/Cyb…
 
FireEye’s blog addressing unauthorized access to their Red Team’s tools and techniques—which include leveraging well known CVEs—underscores the need to #patch. Protect your systems, review FireEye’s GitHub repository to #detect and counter these threats: github.com/fireeye/red_te…
 
Russian state-sponsored cyber actors are exploiting #vulnerability CVE-2020-4006 affecting VMware Workspace ONE Access. We recommend patching immediately. Read our latest #cybersecurity advisory for details, including detection and mitigation actions: nsa.gov/News-Features/…
 
NSA Cyber Retweeted ·  
Today we have launched the @cyberawaregov campaign, encouraging the public to adopt six practical steps to protect their online accounts and devices.

Take a look: ncsc.gov.uk/news/cyber-awa…

#CyberAware
 
Congratulations to the authors of “Spectre Attacks: Exploiting Speculative Execution,” for winning @NSAGov’s 8th Annual Best Scientific #Cybersecurity Research Paper Competition.
Learn more about how this research makes processors & computers more secure: nsa.gov/News-Features/…
 
NSA Cyber Retweeted ·  
It’s our birthday! #CISAgov was established on November 16, 2018. From elections to COVID-19 to natural disasters and more, year two has been action-packed. Let’s take a trip down memory lane…
 
 
Free access is provided to the 8 hour timeframe for this page.

A Trendsmap Explore subscription provides full access to all available timeframes

Find out more

This account is already logged in to Trendsmap.
Your subscription allows access for one user. If you require access for more users, you can create additional subscriptions.
Please Contact us if you are interested in discussing discounts for 3+ users for your organisation, or have any other queries.