You are here

Cybersecurity

(TLP:CLEAR) FBI PSA: North Korean IT Worker Threats to U.S. Businesses

Summary: Yesterday, the FBI released a Public Service Announcement (PSA) providing an update to previously shared guidance regarding the Democratic People’s Republic of Korea (North Korea) IT worker threat to U.S. organizations. The PSA shares how North Korea is evading U.S. and U.N. sanctions by targeting private companies to illicitly generate substantial revenue for the regime.

(TLP:CLEAR) Joint Cybersecurity Advisory - #StopRansomware: Interlock Ransomware

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware.

(TLP:CLEAR) WaterISAC Advisory - ACTION MAY BE REQUIRED: Critical Vulnerabilities in On-Premises SharePoint Server Actively Exploited (Updated July 24, 2025)

July 24, 2025

CISA continues to update reporting on this ongoing activity, as threat actor tactics, techniques, and procedures (TTPs) continue to evolve. This update contains additional information on the deployment of ransomware, new webshells involved in exploitation, and enhanced detection guidance.

July 22, 2025

(TLP:CLEAR) AWWA’s New and Revised Cybersecurity Resources

Summary: WaterISAC is pleased to share that the American Water Works Association (AWWA), with the help of many subject matter experts (SMEs) within the water sector including WaterISAC, has released significant updates and revisions to its cybersecurity resources to aid utilities in building their cyber resilience. This comes as water and wastewater systems in the U.S.

(TLP:CLEAR) Fortinet Report: 2025 State of Operational Technology and Cybersecurity

Summary: Fortinet recently released its “2025 State of Operational Technology and Cybersecurity Report” which draws on data from a global survey of more than 550 OT professionals conducted by an independent research firm. The report highlights key areas where organizations need to bolster their defenses, especially as IT and OT environments become interconnected and exposed.

Pages

Subscribe to Cybersecurity