DHS Strengthens National Cybersecurity Resilience and Infrastructure Protection

DHS Strengthens National Cybersecurity Resilience and Infrastructure Protection

Tuesday, December 23, 2025

Top 5 Cybersecurity Stories You Should Know

  1. DHS Strengthens National Cybersecurity Resilience and Infrastructure Protectiontl;dr: The Department of Homeland Security (DHS) plays a crucial role in enhancing cybersecurity resilience across the United States. Through the Cybersecurity and Infrastructure Security Agency (CISA), DHS collaborates with federal, state, local, tribal, and territorial governments, as well as private sector partners, to manage cyber risks and protect critical infrastructure. Key initiatives include safeguarding election security, addressing vulnerabilities like the Log4j incident, and enhancing transportation cybersecurity. Stakeholders are encouraged to engage with CISA resources and adopt recommended best practices to fortify their cybersecurity posture.
    https://www.dhs.gov/topics/cybersecurity

  2. CISA Issues Guidance to Strengthen Communications Infrastructure Against Cyber Threatstl;dr: The Cybersecurity and Infrastructure Security Agency (CISA), along with other security agencies, has released guidance to bolster the security of communications infrastructure against cyber espionage threats, particularly from PRC-affiliated actors. The guidance emphasizes enhancing network visibility and hardening systems through best practices such as monitoring configuration changes, implementing secure logging, and using out-of-band management networks. Organizations, especially telecommunications providers, are urged to adopt these strategies to mitigate vulnerabilities and reduce the risk of exploitation by malicious cyber actors.
    https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure

  3. CISA Releases Draft Report on Protecting Tokens and Assertions for Public Commenttl;dr: The Cybersecurity and Infrastructure Security Agency (CISA) has released a draft interagency report focused on protecting tokens and assertions, inviting public comments until January 30, 2026. This report includes implementation recommendations aimed at enhancing security for federal agencies and cloud service providers. Stakeholders are encouraged to review the draft and provide feedback to improve the guidelines, which are crucial for safeguarding sensitive information against tampering and misuse. This initiative reflects CISA's commitment to strengthening cybersecurity practices across various sectors.
    https://www.cisa.gov/

  4. Understanding Cybersecurity: Protecting Your Digital Lifetl;dr: Cybersecurity involves safeguarding networks, devices, and data from unauthorized access and criminal activities, ensuring the confidentiality, integrity, and availability of information. As our reliance on technology grows, so do the risks of cyber threats such as malware, data breaches, and identity theft. Individuals and organizations can enhance their cybersecurity posture by keeping software updated, using strong passwords, implementing multifactor authentication, and being cautious of phishing emails. For more guidance, refer to resources from the Cybersecurity and Infrastructure Security Agency (CISA) to protect against potential cyberattacks.
    https://www.cisa.gov/news-events/news/what-cybersecurity

  5. CISA Offers Cybersecurity Awareness and Training Resources for All Sectorstl;dr: The Cybersecurity and Infrastructure Security Agency (CISA) provides a comprehensive suite of cybersecurity awareness and training resources aimed at enhancing knowledge across various sectors, including government, education, and small businesses. Key offerings include toolkits, training programs, and best practices for mitigating cyber threats. CISA emphasizes the importance of organizational readiness and resilience against cyber incidents, making these resources essential for anyone responsible for safeguarding sensitive information and ensuring operational continuity. Stakeholders are encouraged to utilize these materials to bolster their cybersecurity posture.
    https://www.cisa.gov/cybersecurity-awareness-training


Cybersecurity Career Guide (Free eBook) — Actionable playbook to land your first role.
Explore →


Connect with LufSec

Read more

Fortinet Auth Bypass Vulnerabilities CVE-2025-59718 & CVE-2025-59719 Actively Exploited

Fortinet Auth Bypass Vulnerabilities CVE-2025-59718 & CVE-2025-59719 Actively Exploited

Thursday, December 18, 2025 Top 5 Cybersecurity Stories You Should Know 1. Fortinet Auth Bypass Vulnerabilities CVE-2025-59718 & CVE-2025-59719 Actively Exploited — tl;dr: Hackers are actively exploiting two critical vulnerabilities (CVE-2025-59718 and CVE-2025-59719) in Fortinet products, allowing unauthorized access to admin accounts and system configuration files. These flaws affect FortiOS,

By Luciano Ferrari