You are here

Cybersecurity

Joint Cybersecurity Advisory on Enhanced Monitoring to Detect APT Activity Targeting Outlook Online

The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released a joint Cybersecurity Advisory (CSA), Enhanced Monitoring to Detect APT Activity Targeting Outlook Online, to provide guidance to agencies and critical infrastructure organizations on enhancing monitoring in Microsoft Exchange Online environments. 

Threat Awareness – Defending Against EvilProxy Phishing Toolkit

Despite growing awareness of the threat from phishing emails and greater adoption of multifactor authentication (MFA), threat actors are still successfully compromising firms via phishing attacks and breaching MFA protections with phishing toolkits. To help bring greater awareness to this activity, Proofpoint recently published a blog detailing how network defenders can help mitigate this threat.

Ransomware Awareness – New Ransomware Strain Displays Fake Windows Update Alert to Hide Encryption

Trend Micro has posted a blog analyzing variants from a ransomware strain titled “Big Head,” which has the novel capability of hiding its encryption of a victim’s files with a fake Windows update alert. Researchers describe how, after running a series of checks, these Big Head variants post a screen that looks remarkably similar to what is seen when Windows is applying an update, before posting the actual ransom note once the encryption is complete.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – July 6, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases Three Industrial Control Systems Advisories

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

Cyber Resilience – Do you Know Where your Credentials Are?

With stolen credentials leading the charge as the root cause of many data breaches – and certainly one of the easiest methods – it’s important to monitor the various repositories and forums where credentials are often traded. There are numerous services that offer monitoring for stolen credentials and it’s important to be alerted for all the different types of credentials used or stored across your utility, including employee, customer/consumer, partner/third-party supplier, and VIP (executives and board members).

Security Awareness – Cyber Actors Prepping for Amazon Prime Day

As the title states, consumers aren’t the only ones awaiting the famed annual Amazon Prime Day (or days). While threat actors may be procuring some Prime Day purchases, that isn’t the only activity they are predisposed. According to Check Point Research (CPR), there were almost 1,500 new domains related to the term “Amazon” of which 92% were found to be either malicious or suspicious. Furthermore, one out of every 68 “Amazon” related new domains were also related to “Amazon Prime,” of which about 93% of those domains were found to be risky.

Pages

Subscribe to Cybersecurity