You are here

Cybersecurity

Pulse Connect Secure (PCS) SSL VPN - Vulnerability Exploitation Activity - Updated July 22, 2021

Pulse Connect Secure (PCS) SSL VPN - Vulnerabilities being Actively Exploited - Updated July 22, 2021

Reminder: If your utility uses Ivanti Pulse Connect Secure (PCS) SSL VPN, WaterISAC highly recommends tracking and reviewing current notifications/alerts/advisories for important developments.

Resilience – Secure Information Sharing Helps Everyone

In the survey conducted by the Water Sector Coordinating Council, Cybersecurity: 2021 State of the Sector, participants were asked about concerns regarding the exchange of organizational information on cybersecurity threats, vulnerabilities, mitigation, and security incidents with external organizations. While over 30% identified no barriers, 60% noted lack of know-how (37.76%) and lack of trust around maintaining confidentiality of information shared (22.39%).

CISA Launches StopRansomware Initiative

CISA launched a StopRansomware initiative to bring greater awareness to this global cyber threat epidemic. The newly refreshed page has been rebranded and reorganized, and offers consolidated ransomware resources from all federal government agencies. While CISA did register a separate domain (stopransomware.gov) – presumably so they control it and so it’s not taken over by miscreants – the new domain redirects to a cisa.gov root domain (at least for the moment).

OT Cybersecurity – Thoughts on Industrial Sensor Monitoring to Make Critical Infrastructure a Less Attractive Target for Cyber Attacks

Many know Joe Weiss as a passionate proponent of ICS cybersecurity for control system process/sensor (level 0,1) devices. In this recent post he offers several points worthy of consideration on the importance of technology to monitor sensors. The discussion includes multiple water system examples. Read more at Control Global.

OT Cybersecurity – OT-based Credentials Observed Across Public Sources

While some water and wastewater utilities are able to maintain strict separation between OT and IT networks and the internet, that is not the reality for all. Credential leaks, credential reuse across sites, services, and systems, along with the ability to discover internet accessible and insecure control systems through open source search engines such as Shodan and Censys provide threat actors with plenty of opportunity to gain remote access to OT systems.

Pages

Subscribe to Cybersecurity