You are here

Cybersecurity

Business Continuity and Resiliency Planning – Asset Management

ICS security technology firm, Applied Risk discusses the importance of asset identification in ICS environments. The post explains how to approach asset identification and the benefits of passive monitoring solutions, not only to discover assets, but also for maintaining an up-to-date inventory, highlighting anomalies, and pinpointing operational problems – all while avoiding disruption to critical processes.

Iranian Man Who Hacked into U.S. Dam among FBI’s Most-Wanted Cyber Criminals

Business Insider has published an article highlighting some of the individuals on the FBI’s “Cyber’s Most Wanted” webpage. Many of these hackers are affiliated with nation-states, such as a group of Iranians who are believed to work for the “Mabna Institute” that conducts malicious cyber activities on behalf of the Iranian government. In the case of one Iranian hacker, who does not appear to be associated with the Mabna Institute, the suspect is believed to have hacked into the industrial control systems of a dam in upstate New York.

Malicious Cyber Activity Targeting ERP Applications

The NCCIC advises that Digital Shadows Ltd. and Onapsis Inc. have released a report describing an increase in the exploitation of vulnerabilities in Enterprise Resource Planning (ERP) applications. ERP applications help organizations manage critical business processes—such as product lifecycle management, customer relationship management, and supply chain management. An attacker can exploit these vulnerabilities to obtain access to sensitive information.

Private Sector Played Critical Role in WannaCry Attribution, ODNI Official Says

Private sector companies had a key role in the U.S. government’s attribution of last year’s WannaCry ransomware epidemic to North Korea, said Office of the Director of National Intelligence (ODNI) Cyber Threat Intelligence Integration Center (CTIIC) Director Tonya Ugoretz. She explained CTIIC learned of information about WannaCry that had been fed to the Department of Homeland Security by its private sector partners. This information allowed the U.S.

Identity and Access Management for Electric Utilities

The National Institute of Standards and Technology (NIST) has released a special publication that provides guidance and best practices for electric utilities to securely and efficiently manage access to the networked devices and facilities on which power generation, transmission, and distribution depend. According to NIST, such guidance is especially necessary now given the challenges posed by the convergence of OT and IT departments.

Emotet Malware - Costly and Destructive Malware Affecting Public and Private Sectors

The NCCIC has released a Threat Alert on the Emotet malware, an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT) governments, and the private and public sectors. Emotet is disseminated through malspam (emails containing malicious attachments or links) that uses branding familiar to the recipient and imitates PayPal receipts, shipping notifications, or “past-due” invoices.

Pages

Subscribe to Cybersecurity