You are here

Cybersecurity

(Update December 15, 2022) Six Added to CISA’s Known Exploited Vulnerabilities Catalog Includes Four Zero Days

This week, CISA added 6 vulnerabilities to its Known Exploited Vulnerabilities Catalog, all for disclosed CVEs for 2022. The adds impact 5 vendors/products and have the customary 3 week remediation deadlines of 1/3/2023 and 1/4/2023. Four of the adds are particularly notable due to having been exploited as zero-days for widely used products and platforms prior to the patches being created, including Apple, Citrix, Fortinet, and Microsoft.

Third-Party Risk Management – Evaluating Cyber Risk Posed by IT and Managed Service Providers

Despite AWIA Section 2013 and/or cyber insurance requirements, do you still struggle with risk management? Even more so with your third-party – vendors, contractors, consultants, and integrators – relationships? As organizations struggle with assessing risk across their own organizational attack surface, it’s often more challenging to assess the cyber risk posed from and preparedness of third-party partners (new and existing). Many aren’t sure where to start or even what questions to ask of these trusted partners – perhaps even more so with technology services partners.

Cyber Resilience – Considerations for Cyber Insurance Coverage in 2023

CSO Online posted an article discussing what potential purchasers of cyber insurance should be aware of in the new year. As the number of companies reporting attacks to insurers increases, so have the requirements for the purchase or renewal of policies. There are two broad trends impacting cyber insurance: insurers requiring a stronger security posture from organizations and the increasing cost of insurance.

Resilience – Are you Confident in your Cyber Resilience?

Does cyber resilience keep you up at night? How confident are you in defending your utility’s cyber resilience status? Cisco’s newest Security Outcomes Report - Volume 3 may help as it explores seven success factors for boosting cyber resilience. In developing the report, Cisco asked 4,700 practitioners across 26 countries what security resilience means to them, what they’re doing successfully to achieve it, and what they’re struggling with.

Threat Awareness – Social Engineering Success Drives Dark Web Demand for Information Stealers

According to a recent report by Accenture, the successful combination of stolen credentials and social engineering tactics to breach networks is increasing the demand for information stealers on the Dark Web. Specifically, Accenture notes a marked increase in the number of Dark Web advertisements for new information stealer malware variants. The report also discusses how the success of MFA fatigue attacks has contributed to this increased demand.

Pages

Subscribe to Cybersecurity