You are here

Cybersecurity

Ransomware Resilience – Federal Government: Low Victim Reporting Hampers Ransomware Response Efforts

CyberScoop has written an article discussing federal concerns over victims’ reluctance to report ransomware attacks to the broader community, as outlined in the Institute for Security and Technology’s  Ransomware Task Force May 2023 Progress Report. The FBI and Justice Department have stated that only 20% of victims report if they’ve been infected.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – May 9, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

Alerts, Updates, and Bulletins:

Threat Awareness – IcedID and QBot Malware Continue to Propagate with Various Techniques to Compromise more Victims

Commodity malware continues to plague businesses and the threat actors employing them are utilizing a diverse toolset of tactics, techniques, and procedures in order to proliferate the malware, such as IcedID and Qbot/Qakbot, and compromise more victims.

Courts Rule in Favor of Merck in Major Cyber Insurance Claim Case

Security Week has written an article covering the Superior Court of New Jersey Appellate Division’s ruling in favor of Merck in the company’s $1.4 billion claim against insurers for the fallout of the NotPetya attack it suffered in 2017. Insurers argued that the property insurance offered to Merck had a war exclusion clause that was “clear and unambiguous, and it plainly applies to the NotPetya attack.”

Cyber Hygiene – Phishing Resistant MFA and Complex Passwords

Despite all the hype, many organizations implementing multifactor authentication (MFA) and complex passwords can still fall victim to cyber attacks. Multiple threat actor types are increasingly bypassing MFA controls, typically through MFA push notification fatigue or exploiting weaknesses in self-enrollment configurations, to gain access to a victim’s network.

Security Awareness – Understanding and Securing ‘Out-of-Control’ Devices

Organizations large and small are adopting endpoint detection and response (EDR) solutions to provide visibility into their networks. However, according to security researchers, many organizations’ percentage of EDR coverage on endpoints is in the range of 60-70 percent, leaving 30-40 percent of devices out of their control, greatly increasing an organization’s cyber risk.

Pages

Subscribe to Cybersecurity