You are here

Cybersecurity

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – April 25, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

Alerts, Updates, and Bulletins:

ICS/OT Ransomware Awareness – Dragos’s Most Recent Industrial Ransomware Analysis Highlights Rising Threat to Industrial Systems

Ransomware attacks continued to be a significant threat to industrial organizations and infrastructure with threat actors employing old and novel tactics to compromise victims, according to Dragos’ most recent first quarter of 2023 Industrial Ransomware Analysis report.

Threat Awareness – Iranian Threat Actor Mint Sandstorm Increasingly Targeting US Critical Infrastructure In 2023

Microsoft has posted a blog providing details on Mint Sandstorm, a threat actor group previously labeled PHOSPHORUS and who is believed to be associated with the Islamic Revolutionary Guard Corps, the intelligence arm of Iran’s military. Over the past year, the group has shifted from network reconnaissance activities to actively targeting U.S. critical infrastructure, including the energy, transportation systems, and chemical sectors.

New WaterISAC Champion - Luminary Automation, Cybersecurity and Engineering, LLC

WaterISAC continues to expand its list of Champions with Luminary Automation, Cybersecurity and Engineering, LLC (Luminary A.C.E.). Luminary A.C.E. is a certified minority-owned and veteran-owned cybersecurity consulting, technology, and engineering firm. They act as a vendor-neutral strategic partner for water and wastewater utilities by assessing, implementing, and managing OT infrastructure to increase operational resilience and cybersecurity readiness. 

Cyber Resilience – Wargaming as a Powerful Tool to Help Build Incident Response Playbooks

Help Net Security has written an article discussing the merits of wargaming to help build well-practiced data breach response processes. The author argues that drilling a wide variety of “what if” scenarios is an effective way for security teams to add new annexes to their existing incident response playbooks, as well as practice emergency communications in a risk-free environment.

Pages

Subscribe to Cybersecurity