You are here

Cybersecurity

OT/ICS Cyber Resilience – Regardless of Size, OT Vulnerability Management Cannot be Ignored

Depending on the size of and resources available at your utility, you may not have implemented a vulnerability management program for your OT infrastructure, let alone for IT. If you have a mature program for OT you are in the minority. However, even if you don’t have a defined program, vulnerability management is a foundational cybersecurity activity that cannot be ignored by anyone.

Threat Awareness – Emotet Botnet Now Delivering Quantum and BlackCat Ransomware

The infamous Emotet botnet is now being used by attackers to deliver Quantum and BlackCat ransomware, based on a report by the cybersecurity firm AdvIntel. Emotet is a very common malware and AdvIntel has observed 1,267,598 total Emotet infections worldwide during the first nine months of 2022. Emotet typically propagates via email phishing campaigns and often hijacks email threads.

DHS Announces a Billion Dollars in Funding for First-Ever State and Local Cybersecurity Grant Program

Last week, the Department of Homeland Security (DHS) announced a first-of-its-kind cybersecurity grant program specifically for state, local, and territorial (SLT) governments across the country. This State and Local Cybersecurity Grant Program, made possible by President Biden’s Bipartisan Infrastructure Law, provides $1 billion in funding to SLT partners over four years, with $185 million available for FY22, to support SLT efforts to address cyber risk to their information systems.

Security Awareness – Threat Actors Abusing Microsoft Edge News Feed Ads for Tech Support Scams

Threat actors are exploiting Microsoft Edge’s News Feed to conduct a malvertising campaign by injecting online advertisements and redirecting potential victims to websites pushing tech support scams, according to security researchers at Malwarebytes. This campaign has been ongoing for at least two months and is currently one of the most extensive operations based on the amount of telemetry noise.

Security Awareness – Threat Actors Exploiting Death of Queen Elizabeth to Steal Credentials and MFA Codes

Threat actors are exploiting the death of Queen Elizabeth II in brand impersonation phishing attacks to steal victims’ Microsoft account credentials, according to security researchers at Proofpoint. The phishing email purports to be from Microsoft and invites recipients to an “artificial technology hub” in the Queen’s honor. The social engineering tactic includes baiting the recipient to open the link so they can sign an online memory board in honor of the Queen.

Cyber Resilience – Australian Cyber Security Centre Releases Updated Information Security Manual

The Australian Cyber Security Centre (ACSC) recently released an updated version of its Information Security Manual (ISM). The purpose of the ISM is to outline a cybersecurity framework that organizations can apply, using a risk management framework to protect information and systems from cyber threats. The ISM is intended for both executives and network defenders.

Joint Cybersecurity Advisory – Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations

Yesterday, the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, the National Security Agency (NSA), U.S. Cyber Command Cyber National Mission Force, the U.S. Department of the Treasury, the Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), and the United Kingdom’s National Cyber Security Centre (NCSC) published a joint Cybersecurity Advisory (CSA) to highlight continued malicious cyber activity by advanced persistent threat (APT) actors affiliated with the Iranian Government’s Islamic Revolutionary Guard Corps (IRGC).

Pages

Subscribe to Cybersecurity