You are here

Cybersecurity

Joint Cybersecurity Information Sheet - Keeping PowerShell - Security Measures to Use and Embrace

The cybersecurity authorities from the U.S., New Zealand, and the United Kingdom have released a joint Cybersecurity Information Sheet (CIS) on PowerShell. The CIS provides recommendations for proper configuration and monitoring of PowerShell, as opposed to removing or disabling it entirely due to its use by malicious actors after gaining access into victim networks.

Security Awareness – Social Engineering: It’s not About the Security, it’s About the People

While properly configured technical controls can go a long way in protecting from cyber threats, there are countless threats that defeat even the best technology solutions. Those threats most often emanate from email and are intentionally designed to bypass blocking controls in an attempt to trick our last line of cyber defense – the users. Furthermore, with email enduring as the most likely ingress for a cyber attack, threat actors have the odds of a successful attack on their side.

Security Awareness – Voice Mail Themed Campaign Targeting Office 365 and Outlook Users

An ongoing phishing campaign targeting U.S. organizations has been observed employing fake voicemail notifications to fool employees into providing their Office 365 or Outlook credentials. In this specific phishing campaign, users receive a phony email stating they have a new voicemail to listen to and are prompted to open an HTML attachment. To increase the chances of success, adversaries ensure the email's “From” field specifically references the targeted organization’s name.

Threat Awareness – Microsoft 365 AutoSave Features Can be Exploited to Encrypt Files

Security researchers have uncovered a potential new ransomware-related threat to Office 365 account users. In this case, adversaries could utilize compromised Office 365 accounts to encrypt files stored in SharePoint and OneDrive cloud services. The attack relies on manipulating the “AutoSave” feature which creates cloud backups of older file types when users make edits. To conduct this attack threat actors need only to compromise an employee’s Office 365 account, usually done via phishing or malicious OAuth apps.

Threat Awareness – New Report Highlights Increasing Phishing Attacks

The first quarter of this year saw the most phishing attacks ever observed, according to a new report. The APWG Phishing Activity Trends Report for the first quarter of 2022 revealed there were 1,025,968 total phishing attacks. This quarter was the first time the three-month total number of phishing attacks exceeded one million. In March alone there were 384,291 attacks, which was also a record monthly total. The report identified webmail services as one of the most targeted sectors.

Cyber Resilience – Performing Asset Inventories

Conducting asset inventories is one of the foundational first steps in setting up a cyber risk management strategy. Since you cannot defend or secure what you do not know you have, performing asset inventories to gain network visibility is critical for all organizations large and small. Despite the overwhelming benefits of performing asset inventories, a recent report from the cybersecurity firm CYREBRO found that many organizations lack full network visibility. Network visibility is a clear awareness of the components, devices, servers, and data that make up a company’s network.

Pages

Subscribe to Cybersecurity