You are here

Cybersecurity

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – January 18, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases One Industrial Control Systems Advisory

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – January 16, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases Two Industrial Control Systems Advisories

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

Security Awareness – New Year, Old Themes

I know it’s only January, but if phishing campaigns feel like Groundhog Day, that’s because they are. Yet, despite the same ‘ol themes, it’s important to keep staff apprised and reminded of the tried-and-true tricks that threat actors keep using because they keep working. And if there’s one thing miscreants have a penchant for, it’s cultural and seasonal themes. If you’re wondering if you should warn your wonderful users about which themes to be wary, check out these recent posts from Cofense and Checkpoint for a clue!

Security Awareness – Continued use of “Adversary-in-the-Middle” (AitM) Attacks Expected to Continue

As Phishing-as-a-Service (PhaaS) offerings have lowered the barrier to entry for low-skilled threat actors, “Adversary-in-the-Middle” (AitM) attacks have become much less technical to execute. Open-source toolkits such as “EvilGinx3,” make phishing campaigns accessible to the most novice threat actors. With such frameworks, actors can easily create custom Office 365 login pages; mimic other popular websites such as Amazon, LinkedIn, Facebook, and X (formerly Twitter) to conduct opportunistic or highly targeted phishing campaigns.

Pages

Subscribe to Cybersecurity