You are here

Cybersecurity

Threat Awareness – Ransomware Compendium

It has been a bit of a whirlwind in ransomware this past week. Bits have been circulating about Ryuk reaping the rewards from its wreckage, a new strain detonating within an hour after gaining access to the network, and an indiscriminate sample with a version to infect Linux. BleepingComputer has those details and much more in its recent “The Week in Ransomware” series for November 6, 2020.

Information and Communication Technology Supply Chain COVID-19 Lessons Learned

The Cybersecurity and Infrastructure Security Agency (CISA) and government and industry partners recently published the Building A More Resilient ICT Supply Chain: Lessons Learned During The COVID-19 Pandemic report, which examines how the COVID-19 pandemic impacted the logistical supply chains of information and communication technology companies and provides recommendations to increase supply chain resilience.

WECON PLC Editor (ICSA-20-310-01) - Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on stack-based buffer overflow and heap-based buffer overflow vulnerabilities in WECON PLC Editor. Versions 1.3.8 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to execute code under the privileges of the application. WECON is aware of these vulnerabilities and is currently developing a solution. CISA also recommends a seried of measures to mitigate these vulnerabilities.

What Every CISO Should Ask about OT/ICS Security

It is not uncommon for OT/ICS cybersecurity to fall under the authority of IT. This isn’t necessarily a bad thing, unless IT is taking responsibility/action and lacks OT-specific knowledge. While many concepts can be drawn from IT security to help secure OT, many of the processes do not translate well. The opposite also presents a challenge, as many OT operators and engineers may not have cybersecurity experience. This is why it is imperative for both OT and IT cybersecurity teams to work together; however, that isn’t always as easy as it sounds.

Pages

Subscribe to Cybersecurity