You are here

Cybersecurity

Joint Cybersecurity Advisory - People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI and the National Security Agency (NSA), have published a joint Cybersecurity Advisory (CSA) describing the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised infrastructure. The advisory describes the targeting and compromise of major telecommunications companies and network service providers and the top vulnerabilities routinely exploited by threat actors since 2020.

Vulnerability Awareness - Atlassian Releases New Versions of Confluence Server and Data Center to Address CVE-2022-26134

Atlassian has released new Confluence Server and Data Center versions to address remote code execution vulnerability CVE-2022-26134 affecting these products. An unauthenticated remote attacker could exploit this vulnerability to execute code remotely, create new admin accounts, and conduct other malicious activity such as deploy ransomware. Last Friday, a proof-of-concept exploit for the Atlassian Confluence vulnerability was publicly posted.

More Than a Password - Multi-Factor Authentication

The Cybersecurity and Infrastructure Security Agency (CISA) is urging all organizations to implement multi-factor authentication (MFA) to increase their cyber defenses. Today, more and more threat actors are compromising entities and defrauding individuals via stolen passwords. That is why implementing more than just a password to guard access to your devices and networks is critical. Indeed, the MFA webpage states that “adversaries are increasingly capable of phishing or harvesting passwords to gain unauthorized access. They take advantage of passwords you reused on other systems.

Proofpoint Human Factor 2022 Report

The cybersecurity firm Proofpoint just released its 2022 edition of the Human Factor Report, which focuses on the lures and techniques that threat actors use to fool individuals into performing a certain activity and compromising an organization’s cyber defenses. Among many other findings, the report details how threats emanating from email continue to plague organizations. Specifically, the difference in email attacks containing malicious attachments versus malicious links. Email attacks containing malicious links were three to four times more common than attachment-based attacks.

FBI PSA - FBI Warns of Scammers Soliciting Donations Related to the Crisis in Ukraine

The FBI has published a Public Service Announcement (PSA) warning the public of fraudulent schemes seeking donations or other financial assistance related to the war in Ukraine. According to the PSA, “criminal actors are taking advantage of the crisis in Ukraine by posing as Ukrainian entities needing humanitarian aid or developing fundraising efforts, including monetary and cryptocurrency donations.” Taking advantage of crises to scam unwitting individuals is nothing new, but its important to be aware of these schemes as fraudsters develop more sophisticated scams to steal money.

OT Ransomware Resilience – Are you Ready for an OT Impacting Ransomware Attack?

Traditional ransomware impacts data – data availability, data confidentiality, and even data integrity. The targets of traditional ransomware are often IT devices and the recovery method is typically a restore from backup (or rebuild). While annoying and inconvenient, it’s not usually an operations impacting event – Colonial Pipeline notwithstanding. However, as ransomware groups continue evolving their tradecraft and capabilities, anything is possible.

Pages

Subscribe to Cybersecurity