<rss xmlns:a10="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Blog Feed - Center for Internet Security</title><link>https://www.cisecurity.org/feed/blog</link><description>Industry news, product updates, videos, infographics, and more from CIS.</description><language>en</language><image><url>https://www.cisecurity.org/-/jssmedia/project/cisecurity/cisecurity/data/media/img/uploads/2020/04/cropped-cis-512x512-1-32x32.png?h=32&amp;w=32&amp;rev=023ed3a07d874562a4ebce861c4525f0</url><title>Blog Feed - Center for Internet Security</title><link>https://www.cisecurity.org/feed/blog</link></image><item><guid isPermaLink="false">59aa4617-fed9-4196-8c78-c490106fb487</guid><link>https://www.cisecurity.org/insights/blog/vimeo-themed-phishing-campaign-targeting-personal-data</link><title>Vimeo-Themed Phishing Campaign Targeting Personal and Banking Data</title><description>CIS CTI has identified an ongoing Vimeo-themed phishing campaign impacting U.S. SLTTs. Read the team's analysis to learn how to stay safe.</description><pubDate>Mon, 06 Apr 2026 13:01:00 -0400</pubDate></item><item><guid isPermaLink="false">286c3c93-7454-4663-8b47-0031714b5012</guid><link>https://www.cisecurity.org/insights/blog/irs-themed-phishing-granting-threat-actors-remote-access</link><title>IRS-Themed Phishing Granting Threat Actors Remote Access</title><description>The CIS CTI team spotted an ongoing campaign targeting SLTT government entities with tax- and IRS-themed phishing lures. Take a closer look.</description><pubDate>Tue, 24 Mar 2026 14:33:00 -0400</pubDate></item><item><guid isPermaLink="false">c3afa3a6-fbcd-42aa-9e11-50089cfedc9a</guid><link>https://www.cisecurity.org/insights/blog/rsac-2026-insights-from-tony-sager</link><title>What’s on My Radar for RSAC 2026: Insights from Tony Sager</title><description>Ahead of RSAC 2026 Conference, Tony Sager shares his thoughts about upcoming sessions and how he navigates the conference. </description><pubDate>Tue, 17 Mar 2026 16:23:00 -0400</pubDate></item><item><guid isPermaLink="false">efa51f55-2480-4cb3-96b9-00b9acfd40c7</guid><link>https://www.cisecurity.org/insights/blog/zphp-campaign-delivering-remcos-rat-impacting-sltts</link><title>ZPHP Campaign Delivering Remcos RAT Impacting SLTTs</title><description>CIS CTI identified an ongoing ZPHP campaign impacting U.S. SLTTs that delivers the Remcos RAT. Find out how to defend your organization.</description><pubDate>Tue, 17 Mar 2026 16:23:00 -0400</pubDate></item><item><guid isPermaLink="false">9489a660-6006-49c9-89df-ead38b4dfa16</guid><link>https://www.cisecurity.org/insights/blog/2025-year-in-review-sustaining-cybersecurity</link><title>2025 Year in Review: Sustaining Cybersecurity</title><description>CIS sustained vital protections despite funding cuts and rising multidimensional threats. Learn more by watching our 2025 Year in Review 2025 video.</description><pubDate>Mon, 16 Mar 2026 09:47:00 -0400</pubDate></item><item><guid isPermaLink="false">b908adc9-db87-410a-a006-e09ef825c4f2</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-march-2026-update</link><title>CIS Benchmarks March 2026 Update</title><description>Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for March 2026.</description><pubDate>Fri, 06 Mar 2026 10:06:00 -0500</pubDate></item><item><guid isPermaLink="false">49cbd51c-a931-4506-9578-330f86a8efad</guid><link>https://www.cisecurity.org/insights/blog/strengthening-software-assurance-across-government-systems</link><title>Strengthening Software Assurance Across Government Systems</title><description>Secure by Design ultimately supports a broader public mission: delivering trustworthy, secure, and sustainable technology that citizens can rely on.</description><pubDate>Thu, 05 Mar 2026 17:03:00 -0500</pubDate></item><item><guid isPermaLink="false">40d4a027-9ff3-417a-87b6-68684e13edc3</guid><link>https://www.cisecurity.org/insights/blog/how-to-defend-against-irans-cyber-retaliation-playbook</link><title>How to Defend Against Iran's Cyber Retaliation Playbook</title><description>Security leaders must give equal weight to the cyber dimension following U.S.-Israeli kinetic activity against Iran. Here's our recommendations. </description><pubDate>Wed, 04 Mar 2026 13:54:00 -0500</pubDate></item><item><guid isPermaLink="false">e7415caf-6dc7-4b2a-a014-e209ead490e5</guid><link>https://www.cisecurity.org/insights/blog/multiply-endpoint-securitys-force-at-your-public-utility</link><title>Multiply Endpoint Security's Force at Your Public Utility</title><description>A public utility can multiply the force of endpoint security with a 24x7x365 protection and monitoring strategy. Read our blog to learn more.</description><pubDate>Fri, 20 Feb 2026 09:10:00 -0500</pubDate></item><item><guid isPermaLink="false">21690222-04f7-497f-accf-3785cd6264af</guid><link>https://www.cisecurity.org/insights/blog/upholding-us-sltt-resilience-with-affordable-services</link><title>Upholding U.S. SLTT Resilience with Affordable Services</title><description>The MS-ISAC bridges the U.S. SLTT resilience gap by offering under-resourced organizations access to affordable services. Read to learn more.</description><pubDate>Thu, 12 Feb 2026 09:40:00 -0500</pubDate></item><item><guid isPermaLink="false">cc437313-dc84-4ef1-a2b9-d520a81be220</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-february-2026-update</link><title>CIS Benchmarks February 2026 Update</title><description>Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for February 2026.</description><pubDate>Mon, 09 Feb 2026 12:09:00 -0500</pubDate></item><item><guid isPermaLink="false">3798ab15-2836-472a-993f-8e91dedff258</guid><link>https://www.cisecurity.org/insights/blog/top-10-malware-q4-2025</link><title>Top 10 Malware Q4 2025</title><description>Total malware notifications from MS-ISAC monitoring services increased 7% from Q3 to Q4 2025. Learn more by reading our Top 10 Malware list.</description><pubDate>Thu, 29 Jan 2026 09:14:00 -0500</pubDate></item><item><guid isPermaLink="false">ccb04f12-df53-4a10-ae47-089a624648e3</guid><link>https://www.cisecurity.org/insights/blog/cis-hardened-images-aws-european-sovereign-cloud</link><title>CIS Hardened Images Now in the AWS European Sovereign Cloud</title><description>CIS Hardened Images are now in the AWS European Sovereign Cloud. Learn how this can help you to reduce risk, improve consistency, and more.</description><pubDate>Wed, 14 Jan 2026 09:46:00 -0500</pubDate></item><item><guid isPermaLink="false">ec8b3064-bdc2-4d17-9808-190f01d1ffe6</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-january-2026-update</link><title>CIS Benchmarks January 2026 Update</title><description>Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for January 2026.</description><pubDate>Mon, 12 Jan 2026 10:30:00 -0500</pubDate></item><item><guid isPermaLink="false">235c2044-9720-432e-94ca-86f016cf6a62</guid><link>https://www.cisecurity.org/insights/blog/security-in-the-cloud-with-more-automation</link><title>Security in the Cloud with More Automation</title><description>CIS is making security in the cloud even easier for you by releasing a CIS hardening component in EC2 Image Builder on Amazon Web Services (AWS).</description><pubDate>Wed, 07 Jan 2026 10:09:00 -0500</pubDate></item><item><guid isPermaLink="false">92cda704-dbe4-4b8d-afc2-8c8d5feaee7e</guid><link>https://www.cisecurity.org/insights/blog/cybersecurity-collaboration-for-the-us-sltt-community</link><title>Cybersecurity Collaboration for the U.S. SLTT Community</title><description>The MS-ISAC provides the only nationwide network dedicated to cybersecurity collaboration in the U.S. SLTT community. Read on to learn more.</description><pubDate>Fri, 26 Dec 2025 11:17:00 -0500</pubDate></item><item><guid isPermaLink="false">f0837452-2a88-4e84-8258-093b8590634d</guid><link>https://www.cisecurity.org/insights/blog/malicious-crystal-pdf-converter-detected-on-sltt-networks</link><title>Malicious Crystal PDF Converter Detected on SLTT Networks</title><description>In October 2025, CIS CTI observed a rise in CIS MDR alerts associated with Crystal PDF on U.S. SLTT endpoints. Here's how to defend yourself.</description><pubDate>Wed, 24 Dec 2025 10:58:00 -0500</pubDate></item><item><guid isPermaLink="false">44d4f656-8a3b-459e-99ff-93eb250b7d2f</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-december-2025-update</link><title>CIS Benchmarks December 2025 Update</title><description>Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for December 2025.</description><pubDate>Thu, 18 Dec 2025 12:31:00 -0500</pubDate></item><item><guid isPermaLink="false">7f6df795-5f59-40a0-bdcb-ee7e21a73358</guid><link>https://www.cisecurity.org/insights/blog/scale-linux-workload-security-on-azure-with-cis-benchmarks</link><title>Scale Linux Workload Security on Azure with CIS Benchmarks</title><description>Looking to automate Azure Linux hardening and streamline hybrid security? Learn how to do it at scale with Azure OSConfig and the CIS Benchmarks.</description><pubDate>Tue, 16 Dec 2025 17:31:00 -0500</pubDate></item><item><guid isPermaLink="false">7a5b2e73-154b-4156-8e0b-ac46213cc581</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-update-november-2025</link><title>CIS Benchmarks Update November 2025</title><description>The November 2025 CIS Benchmarks monthly update highlights the CIS Benchmarks and CIS Build Kits that have been updated or recently released.</description><pubDate>Wed, 19 Nov 2025 16:39:00 -0500</pubDate></item><item><guid isPermaLink="false">7e01025b-bc8a-4a13-ad0d-8336fcfca2c8</guid><link>https://www.cisecurity.org/insights/blog/control-assist-path-cyber-insurance-readiness-smbs</link><title>Control Assist: A Path to Cyber Insurance Readiness for SMBs</title><description>CIS and CyberAcuView have launched Control Assist, an initiative designed to simplify cyber insurance and strengthen cybersecurity for SMBs.</description><pubDate>Wed, 19 Nov 2025 08:32:00 -0500</pubDate></item><item><guid isPermaLink="false">417a7c7c-372f-4061-9408-05c045cbc6dc</guid><link>https://www.cisecurity.org/insights/blog/impact-of-federal-funding-cuts-to-the-value-of-ms-isac-cti</link><title>Impact of Federal Funding Cuts to the Value of MS-ISAC CTI</title><description>The adoption of a fee-based membership model has had minimal and in some aspects positive impact on MS-ISAC CTI. Read our blog to learn more.</description><pubDate>Mon, 17 Nov 2025 13:01:00 -0500</pubDate></item><item><guid isPermaLink="false">b39a585b-ec80-4b86-be63-7a09bdbee611</guid><link>https://www.cisecurity.org/insights/blog/top-10-malware-q3-2025</link><title>Top 10 Malware Q3 2025</title><description>Total malware notifications from MS-ISAC monitoring services increased 38% from Q2 to Q3 2025. Learn more by reading our Top 10 Malware list.</description><pubDate>Fri, 14 Nov 2025 09:43:00 -0500</pubDate></item><item><guid isPermaLink="false">eba94504-b2bc-4ccc-9b53-88bf80664aff</guid><link>https://www.cisecurity.org/insights/blog/7-cis-experts-2026-cybersecurity-predictions</link><title>7 CIS Experts' 2026 Cybersecurity Predictions</title><description>What does 2026 have in store for cybersecurity? Read our experts' 2026 cybersecurity predictions to find out and get planning.</description><pubDate>Fri, 31 Oct 2025 13:11:00 -0400</pubDate></item><item><guid isPermaLink="false">2c6d4a95-4ae4-4134-8cd6-b7f000537413</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-monthly-update-october-2025</link><title>CIS Benchmarks Monthly Update October 2025</title><description>We've highlighted the major updates for CIS Benchmarks and CIS Build Kits  in the Benchmarks Monthly Update for October 2025.</description><pubDate>Fri, 31 Oct 2025 09:06:00 -0400</pubDate></item><item><guid isPermaLink="false">9071096c-1ea5-4673-b911-4a29498cc57c</guid><link>https://www.cisecurity.org/insights/blog/ms-isac-member-reported-phishing-likely-from-tycoon2fa-phaas</link><title>MS-ISAC Member-Reported Phishing Likely from Tycoon2FA PhaaS</title><description>The CIS CTI team saw an uptick in member-submitted phishing emails in Q3 2025. Learn the overlap these emails have with the Tycoon2FA PhaaS kit.</description><pubDate>Wed, 29 Oct 2025 16:48:00 -0400</pubDate></item><item><guid isPermaLink="false">b2dd865a-8be3-4295-9782-b9f916b04f0c</guid><link>https://www.cisecurity.org/insights/blog/how-secure-by-design-helps-developers-build-secure-software</link><title>How Secure by Design Helps Developers Build Secure Software</title><description>Secure by Design offers practical, risk-based strategies for integrating security into the software development lifecycle.</description><pubDate>Tue, 28 Oct 2025 12:47:00 -0400</pubDate></item><item><guid isPermaLink="false">c5c7b8d1-d915-44a5-9f49-b05d2269f5fa</guid><link>https://www.cisecurity.org/insights/blog/clickfix-an-adaptive-social-engineering-technique</link><title>ClickFix: An Adaptive Social Engineering Technique</title><description>The CIS CTI tracked two ClickFix campaigns between January 2025 and October 2025. Learn more about them and how to defend yourself.</description><pubDate>Mon, 27 Oct 2025 09:47:00 -0400</pubDate></item><item><guid isPermaLink="false">e57e4d2b-7dd8-4b3d-a650-e6f79a860381</guid><link>https://www.cisecurity.org/insights/blog/simplify-security-management-with-cis-securesuite-platform</link><title>Simplify Security Management with CIS SecureSuite Platform</title><description>Looking to simplify security management and accelerate audits? Read our blog post to learn how our CIS SecureSuite Platform can help!</description><pubDate>Thu, 16 Oct 2025 10:39:00 -0400</pubDate></item><item><guid isPermaLink="false">4c631ec8-6352-407d-b360-1ad681cf201c</guid><link>https://www.cisecurity.org/insights/blog/building-a-secure-cloud-foundation-for-healthcare-with-cis</link><title>Building a Secure Cloud Foundation for Healthcare with CIS</title><description>Learn how to accelerate your healthcare compliance with CIS Hardened Images and CIS SecureSuite for secure, audit-ready cloud environments.</description><pubDate>Tue, 14 Oct 2025 14:14:00 -0400</pubDate></item><item><guid isPermaLink="false">37a150b9-a360-41e7-bd66-7121939da1e0</guid><link>https://www.cisecurity.org/insights/blog/reasonable-cybersecurity-legal-theroy-practice</link><title>Reasonable Cybersecurity: From Legal Theory to Practice</title><description>Explore how reasonable cybersecurity is evolving from a legal concept into a practical standard for protecting systems and consumer data.</description><pubDate>Wed, 24 Sep 2025 12:28:00 -0400</pubDate></item><item><guid isPermaLink="false">99a8f1e4-51cf-4641-9024-b2f2234304bd</guid><link>https://www.cisecurity.org/insights/blog/cis-helps-strengthen-cybersecurity-in-energy-and-utilities</link><title>CIS Helps Strengthen Cybersecurity in Energy &amp; Utilities</title><description>Discover how CIS Benchmarks and CIS Controls help energy and utility companies strengthen cybersecurity across IT and OT environments.</description><pubDate>Tue, 23 Sep 2025 11:13:00 -0400</pubDate></item><item><guid isPermaLink="false">e5f8ba7c-a947-46fc-a21e-702ae346e0b0</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-september-2025-update</link><title>CIS Benchmarks Monthly Update September 2025</title><description>The following CIS Benchmarks and CIS Build Kits have been updated or recently released. We've highlighted the major updates below.</description><pubDate>Tue, 23 Sep 2025 09:59:00 -0400</pubDate></item><item><guid isPermaLink="false">e3dbb61e-2732-42ef-a4ad-735eacc9c19a</guid><link>https://www.cisecurity.org/insights/blog/qilin-top-ransomware-threat-to-sltts-in-q2-2025</link><title>Qilin Top Ransomware Threat to SLTTs in Q2 2025</title><description>In Q2 2025, Qilin became the most active ransomware targeting U.S. SLTT government entities. Read the CIS CTI team's analysis to learn more.</description><pubDate>Thu, 11 Sep 2025 09:33:00 -0400</pubDate></item><item><guid isPermaLink="false">cc1fa3f1-d66a-47b6-928c-d01da5ca5f62</guid><link>https://www.cisecurity.org/insights/blog/top-external-network-risks-how-fix-them</link><title>Top External Network Risks And How to Fix Them</title><description>Learn about the top external network risks and recommendations to harden configurations from the CIS Cyber Threat Intelligence team.</description><pubDate>Wed, 27 Aug 2025 09:33:00 -0400</pubDate></item><item><guid isPermaLink="false">3725357f-e8ce-43ef-80b0-2fc97d5f37fa</guid><link>https://www.cisecurity.org/insights/blog/cis-controls-ambassador-spotlight-eric-woodard</link><title>CIS Controls Ambassador Spotlight: Eric Woodard</title><description>The CIS Controls Ambassador program is an initiative of the CIS that focuses on enhancing the adoption of key cybersecurity best practices.</description><pubDate>Thu, 21 Aug 2025 10:07:00 -0400</pubDate></item><item><guid isPermaLink="false">e81b2958-5f9a-4689-b87e-c57d04b2ab74</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-august-2025-update</link><title>CIS Benchmarks August 2025 Update</title><description>Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for August 2025.</description><pubDate>Tue, 19 Aug 2025 10:16:00 -0400</pubDate></item><item><guid isPermaLink="false">ca6c7ecc-36b3-4bdb-847b-47e4324ee44a</guid><link>https://www.cisecurity.org/insights/blog/5-cyber-questions-sheriffs-and-police-chiefs-should-ask</link><title>5 Cyber Questions Sheriffs &amp; Police Chiefs Should Ask</title><description>Cyber threat actors continue to target law enforcement agencies. Here are five cyber questions LE executives can ask to evaluate their defenses.</description><pubDate>Thu, 14 Aug 2025 09:34:00 -0400</pubDate></item><item><guid isPermaLink="false">7e01e359-9f09-4855-99ff-2c5d9cfc4d2d</guid><link>https://www.cisecurity.org/insights/blog/critical-infrastructure-caught-botnet</link><title>Critical Infrastructure Caught in a Botnet</title><description>Cyber threat actors frequently use a botnet in their efforts to target U.S. critical infrastructure. Read on for how to defend your networks.</description><pubDate>Thu, 14 Aug 2025 09:34:00 -0400</pubDate></item><item><guid isPermaLink="false">4f845844-d0f3-418a-93b5-f9b5d9ef3c06</guid><link>https://www.cisecurity.org/insights/blog/applying-cis-benchmarks-harden-windows-11-vdi-systems</link><title>Applying CIS Benchmarks to Harden Windows 11 VDI Systems </title><description>Learn how the CIS IT team successfully implemented CIS Benchmarks in a Virtual Desktop Infrastructure (VDI) environment—specifically focusing on Windows 11.</description><pubDate>Wed, 13 Aug 2025 15:02:00 -0400</pubDate></item><item><guid isPermaLink="false">6f140547-7e81-4bcc-ba8e-0b4b766bfb78</guid><link>https://www.cisecurity.org/insights/blog/introducing-the-cis-controls-oscal-repository</link><title>Automating the CIS Controls with OSCAL</title><description>Automation for Controls: Meet OSCAL, the Open Security Controls Assessment Language OSCAL, also known as the Open Security Controls Assessment.</description><pubDate>Thu, 24 Jul 2025 14:59:00 -0400</pubDate></item><item><guid isPermaLink="false">d069fdb5-5de6-4cfa-ae99-ddec08ea2580</guid><link>https://www.cisecurity.org/insights/blog/top-10-malware-q2-2025</link><title>Top 10 Malware Q2 2025</title><description>Total malware notifications from MS-ISAC monitoring services decreased 18% from Q1 2025 to Q2 2025. Read our Top 10 Malware Q2 2025 for more.</description><pubDate>Fri, 18 Jul 2025 09:27:00 -0400</pubDate></item><item><guid isPermaLink="false">3a1b6889-5378-40fb-993c-89293769b462</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-july-2025-update</link><title>CIS Benchmarks July 2025 Update</title><description>Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for July 2025.</description><pubDate>Tue, 08 Jul 2025 14:49:00 -0400</pubDate></item><item><guid isPermaLink="false">f2a1f822-cbfd-4a86-b807-8a7e37c87156</guid><link>https://www.cisecurity.org/insights/blog/what-makes-cis-hardened-images-secure-enough-for-the-us-ic</link><title>What Makes CIS Hardened Images Secure Enough for the U.S. IC</title><description>How do U.S. IC organizations strengthen their cloud security in a way that meets their needs? See how the CIS Hardened Images® can help.</description><pubDate>Mon, 30 Jun 2025 16:37:00 -0400</pubDate></item><item><guid isPermaLink="false">45a77931-4a22-4f1e-b773-9f95a844b845</guid><link>https://www.cisecurity.org/insights/blog/lay-a-cybersecurity-foundation-and-master-cis-controls-ig1</link><title>Lay a Cybersecurity Foundation and Master CIS Controls IG1</title><description>Today’s digital threats don’t discriminate by size or sector. Building a solid cybersecurity foundation is no longer optional—it’s essential. </description><pubDate>Fri, 13 Jun 2025 14:28:00 -0400</pubDate></item><item><guid isPermaLink="false">60f1cb1b-053e-4161-af87-b4936b59a03d</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-june-2025-update</link><title>CIS Benchmarks June 2025 Update</title><description>Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for June 2025.</description><pubDate>Wed, 11 Jun 2025 14:27:00 -0400</pubDate></item><item><guid isPermaLink="false">e80c73c2-a014-4aca-8d86-ad35bcc50cc9</guid><link>https://www.cisecurity.org/insights/blog/how-threat-modeling-actor-attribution-grow-cyber-defenses</link><title>How Threat Modeling, Actor Attribution Grow Cyber Defenses</title><description>Want to enhance your threat modeling? By combining it with threat actor attribution, you can improve your cyber defenses. Read on to learn more.</description><pubDate>Thu, 15 May 2025 09:37:00 -0400</pubDate></item><item><guid isPermaLink="false">25baae81-1ed9-4e21-9e0d-d989b3821827</guid><link>https://www.cisecurity.org/insights/blog/cis-benchmarks-may-2025-update</link><title>CIS Benchmarks May 2025 Update</title><description>Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for May 2025.</description><pubDate>Mon, 05 May 2025 09:44:00 -0400</pubDate></item><item><guid isPermaLink="false">735b449f-4bee-4896-a5eb-b17b75504f3c</guid><link>https://www.cisecurity.org/insights/blog/top-10-malware-q1-2025</link><title>Top 10 Malware Q1 2025</title><description>In Q1 2025, the Top 10 Malware observed via the MS-ISAC® changed slightly from the previous quarter. Read our blog post to learn more.</description><pubDate>Wed, 23 Apr 2025 13:59:00 -0400</pubDate></item><item><guid isPermaLink="false">939915a7-e117-4e13-87c2-5fd9619a773f</guid><link>https://www.cisecurity.org/insights/blog/hacktivist-group-dienet-claims-ddos-attacks-against-u-s-c-n-i</link><title>Hacktivist Group DieNet Claims DDoS Attacks Against U.S. CNI</title><description>DieNet is a hacktivist group that's claimed DDoS attacks against U.S. critical infrastructure. Read on to learn its ideology and attack activity.</description><pubDate>Wed, 16 Apr 2025 16:28:00 -0400</pubDate></item></channel></rss>