You are here

Cybersecurity

EU Parliament Calls Kaspersky “Confirmed as Malicious,” Recommends Ban

On June 13, the European Union (EU) Parliament passed a resolution characterizing Kaspersky as “confirmed as malicious.” While the resolution is not a ban or legally binding, it does recommend banning the company from information technology used throughout the EU. The vote signals the newest wave of challenges to the company from nations. In September 2017, the U.S.

Schneider Electric U.motion Builder (ICSA-18-163-01) – Product Used in the Energy Sector

The NCCIC has released an advisory on command injection, cross-site scripting, and improper input validation vulnerabilities in Schneider Electric U.motion Bulder. Versions prior to 1.3.4 are affected. Successful exploitation of these vulnerabilities could allow remote code execution. Schneider Electric has released firmware update Version 1.3.4, which includes fixes for these vulnerabilities.

Federal Authorities Announce Coordinated Effort to Disrupt BEC Schemes, Warn Partners of Pervasive Threat

Yesterday, the U.S. Department of Justice (DOJ) announced the culmination of “Operation Wire Wire,” a significant coordinated effort by federal departments and agencies to disrupt Business Email Compromise (BEC) schemes. Operation Wire Wire resulted in 74 arrests in the U.S. and overseas, the seizure of nearly $2.4 million, and the disruption and recovery of approximately $14 million in fraudulent wire transfers. BEC is a sophisticated scam that targets employees with access to company finances.

Google's Proactive Announcement to Changes of Portal Login Page Still Warrants Measure of Caution

On June 14, 2018, Google will roll-out a new G Suite sign-in page and wants users to be aware of the upcoming subtle changes to avoid confusion; G Suite users should familiarize themselves with the new look. There is no doubt Google’s announcement is a positive step to alleviate concern from users thinking they have landed on a phishing page.

Wi-Fi Phishing Attacks Discovered Around Atlanta City Hall After Ransomware Attack

As the city of Atlanta continues to recover from the epic ransomware incident that occurred in March, security researchers have discovered a rash of active Wi-Fi phishing attacks around Atlanta City Hall and the Georgia State Capital Building. As the prolonged aftermath of the SamSam ransomware attack plagues Atlanta, malicious actors seek ways to gain unauthorized access to the city's computer systems through phishing for valuable user credentials.

Rockwell Automation RSLinx Classic and FactoryTalk Linx Gateway (ICSA-18-158-01) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on an unquoted search path or element vulnerability in Rockwell RSLinx Classic and FactoryTalk Linx Gateway. Versions 3.90.01 and prior of the former product and versions 3.90.00 and prior of the latter product are affected. Successful exploitation of this vulnerability could allow an authorized, but non-privileged local user to execute arbitrary code and allow a threat actor to escalate user privileges on the affected workstation. Rockwell Automation recommends all users update to new versions of RSLinx Classic and FactoryTalk Linx Gateway.

CRASHOVERRIDE Activity Expands – Reportedly Targeted Water and Wastewater Sector Organizations

Recent public research indicates the group responsible for the CRASHOVERRIDE (a.k.a., Industroyer) malware used to disrupt the Ukrainian electric grid in 2016 is expanding its target set, reportedly to include organizations in the water and wastewater sector. Additionally, the group is no longer solely geographically focused on targets within the Ukraine.

Basic Cyber Defense – Using the Cyber Kill Chain to Educate Users and Protect Endpoints

The original "Cyber Kill Chain" developed by Lockheed Martin, identifies seven steps adversaries perform to compromise networks and accomplish an objective. TechRepublic posted an article offering basic end-user awareness or endpoint-focused defense actions at each step of the Cyber Kill Chain to stop malicious actors from achieving their ultimate goal.

Pages

Subscribe to Cybersecurity