You are here

Cybersecurity

Supply Chain Resilience – CISA Urges Organizations to Incorporate the FCC Covered List Into Risk Management Plans

The Federal Communications Commission (FCC) maintains a Covered List of communications equipment and services that have been determined by the U.S. government to pose an unacceptable risk to the national security of the United States or the security and safety of United States persons to national security pursuant to the Secure and Trusted Communications Networks Act of 2019.

Vulnerability Awareness – Abuse of the Service Location Protocol May Lead to DoS Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) posted an alert warning network defenders that exploiting the Service Location Protocol (SLP, RFC 2608) allows an unauthenticated remote attacker to register arbitrary services. This could allow an attacker to use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.

Report: Sophos Finds Many Breaches Still Caused by Lack of Patching

Not all trend analysis reports are created equal, but occasionally some stand out. Nonetheless, many such reports are often useful for lessons learned and an enlightening nugget or two. One such report is Sophos’ 2023 Active Adversary Report for Business Leaders, which provides a picture of how threat actors are operating. The report is derived from over 150 incident response engagements selected from its 2022 workload.

Threat Awareness – EvilExtractor: Potentially Legitimate Tool Leveraged for Malicious Intent

Fortinet has written a blog discussing the use of the EvilExtractor tool in a March 2023 phishing campaign targeting networks in America and Europe. EvilExtractor is claimed to be a legitimate education tool, but researchers discovered it being advertised on criminal markets as an information stealer. EvilExtractor is modular, giving it many capabilities, including the ability to steal and upload data, wipe logs, and install ransomware.

Supply Chain Threat Awareness – North Korean X_Trader Supply Chain Attack Targets Energy, Financial Sector

Symantec has written a blog discussing the X_Trader software supply chain attack that impacted critical infrastructure organizations in the United States and Europe, including the energy and financial sectors. X_Trader, developed by Trading Technologies, is typically used for futures trading but a North Korean threat group has been linked to malicious versions utilized to deploy a multi-stage modular backdoor onto victims' systems.

Pages

Subscribe to Cybersecurity