<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="http://www.isc2rva.org/page-8689/BlogPost/4473352/RSS" rel="self" type="application/rss+xml" />
    <title>ISC2 RVA News</title>
    <link>https://www.isc2rva.org/</link>
    <description>ISC2 RVA blog posts</description>
    <dc:creator>ISC2 RVA</dc:creator>
    <generator>Wild Apricot - membership management software and more</generator>
    <language>en</language>
    <pubDate>Tue, 07 Apr 2026 04:16:43 GMT</pubDate>
    <lastBuildDate>Tue, 07 Apr 2026 04:16:43 GMT</lastBuildDate>
    <item>
      <pubDate>Mon, 15 Sep 2025 21:00:23 GMT</pubDate>
      <title>FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks</title>
      <description>&lt;p&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;" color="#272A48" face="Roboto, -apple-system, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif"&gt;The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as UNC6040 and UNC6395 for orchestrating a string of data theft and extortion attacks.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;" color="#272A48" face="Roboto, -apple-system, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif"&gt;UNC6395 is a&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;a href="https://thehackernews.com/2025/09/github-account-compromise-led-to.html"&gt;&lt;font style="font-size: 16px;" color="#4A75FF" face="Roboto, -apple-system, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif"&gt;threat group&lt;/font&gt;&lt;/a&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;" color="#272A48" face="Roboto, -apple-system, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif"&gt;&amp;nbsp;that has been attributed a widespread data theft campaign targeting Salesforce instances in August 2025 by exploiting compromised OAuth tokens for the Salesloft Drift application. In an update issued this week, Salesloft said the attack was made possible due to the breach of its GitHub account from March through June 2025.&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;" color="#272A48" face="Roboto, -apple-system, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif"&gt;The second group the FBI has called attention to is&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;a href="https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html"&gt;&lt;font style="font-size: 16px;" color="#4A75FF" face="Roboto, -apple-system, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif"&gt;UNC6040&lt;/font&gt;&lt;/a&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;" color="#272A48" face="Roboto, -apple-system, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif"&gt;. Assessed to be active since October 2024, UNC6040 is the name assigned by Google to a financially motivated threat cluster that has engaged in vishing campaigns to obtain initial access and hijack Salesforce instances for large-scale data theft and extortion.&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;span style="background-color: rgb(255, 255, 255);"&gt;&lt;font style="font-size: 16px;" color="#272A48" face="Roboto, -apple-system, BlinkMacSystemFont, Segoe UI, Helvetica, Arial, sans-serif"&gt;These attacks have involved the use of a modified version of Salesforce's Data Loader application and custom Python scripts to breach victims' Salesforce portals and exfiltrate valuable data. At least some of the incidents have involved extortion activities following UNC6040 intrusions, with them taking place months after the initial data theft&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <link>https://www.isc2rva.org/news/13542504</link>
      <guid>https://www.isc2rva.org/news/13542504</guid>
      <dc:creator>ISC2 Admin</dc:creator>
    </item>
    <item>
      <pubDate>Sun, 09 Jun 2024 14:30:00 GMT</pubDate>
      <title>ISC2 Pledges One Million FREE ISC2 Certified in Cybersecurity℠ Courses and Exams</title>
      <description>&lt;p&gt;ISC2 Pledges One Million FREE ISC2 Certified in Cybersecurity℠ Courses and Exams&lt;/p&gt;

&lt;p&gt;See yourself in cybersecurity. You don’t need experience — just the passion and drive to enter a demanding and rewarding field, one that opens limitless opportunities worldwide.&lt;/p&gt;

&lt;p&gt;As part of our commitment to help close the cybersecurity workforce gap and diversify those working in the field, ISC2 is offering FREE Certified in Cybersecurity (CC) Online Self-Paced Training and exams to one million people.&lt;/p&gt;

&lt;p&gt;Advancing DEI in Cybersecurity&lt;/p&gt;

&lt;p&gt;To encourage diversity, equity and inclusion in the workforce, ISC2 will work closely with partner organizations as part of this program to reach populations underrepresented in cybersecurity. We’ve pledged half of the commitment – 500,000 course enrollments and exams – to this effort. Organizations serving these groups and willing to partner with us in this DEI effort can contact us at inclusion@isc2.org.&lt;/p&gt;

&lt;p&gt;Start Your Journey&lt;/p&gt;

&lt;p&gt;To participate in the One Million Certified in Cybersecurity program, please follow these simple steps:&lt;/p&gt;

&lt;p&gt;1. Create an account. If you already have an ISC2 account, sign in.&lt;/p&gt;

&lt;p&gt;2. Complete your ISC2 Candidate application form and select Certified in Cybersecurity as your certification of interest.&lt;/p&gt;

&lt;p&gt;3. Once the application is complete, you’ll become an ISC2 Candidate. It’s free to join and you’ll gain access to Official ISC2 Certified in Cybersecurity Online Self-Paced Training and a code to register for the free certification exam. You will find your access on the Candidate Benefits page. Annual dues of U.S. $50 will be due at the end of your first year of ISC2 Candidate status.&lt;/p&gt;

&lt;p&gt;4. Upon passing the exam, completion of the application form and payment of your $50 AMF, you’ll become a certified member of ISC2 – the world’s largest association of certified cybersecurity professionals – with access to a broad range of professional development resources to help you throughout your career.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://my.isc2.org/s/login/SelfRegister?utm_source=isc2&amp;amp;utm_medium=banner&amp;amp;utm_campaign=GBL-CC-1M-AW&amp;amp;utm_term=homepage&amp;amp;utm_content=awareness" target="_blank"&gt;&lt;font style="font-size: 18px;"&gt;Get Started&lt;/font&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://www.isc2rva.org/news/13083660</link>
      <guid>https://www.isc2rva.org/news/13083660</guid>
      <dc:creator>ISC2 Admin</dc:creator>
    </item>
    <item>
      <pubDate>Thu, 06 Jun 2024 14:55:00 GMT</pubDate>
      <title>CROWDSTRIKE 2024 GLOBAL THREAT REPORT</title>
      <description>&lt;p&gt;CROWDSTRIKE 2024 GLOBAL THREAT REPORT&lt;/p&gt;

&lt;p&gt;Resouce URL:&amp;nbsp;&amp;nbsp;&lt;a href="https://go.crowdstrike.com/global-threat-report-2024.html?utm_campaign=cao&amp;amp;utm_content=crwd-cao-amer-us-en-psp-x-wht-gtr-tct-x_x_x_x-x&amp;amp;utm_medium=sem&amp;amp;utm_source=goog&amp;amp;utm_term=internet%20threat%20report&amp;amp;cq_cmp=1705069828&amp;amp;cq_plac=&amp;amp;gad_source=1&amp;amp;gclid=CjwKCAjwvIWzBhAlEiwAHHWgvd1ojle6tyFV3iJ82b4ZQALFuqOJ34OSwjhKEcvvhLtmIbI_bNS2MhoCNdkQAvD_BwE" target="_blank"&gt;CROWDSTRIKE 2024 GLOBAL THREAT REPORT DOWNLOAD&lt;/a&gt;&lt;/p&gt;</description>
      <link>https://www.isc2rva.org/news/13366817</link>
      <guid>https://www.isc2rva.org/news/13366817</guid>
      <dc:creator>ISC2 Admin</dc:creator>
    </item>
  </channel>
</rss>