You are here

Cybersecurity

CISA Alert – Best Practices to Configure BIG-IP LTM Systems

CISA has observed cyber threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to enumerate other non-internet facing devices on the network. F5 BIG-IP is a suite of hardware and software solutions designed to manage and secure network traffic. A malicious cyber actor could leverage the information gathered from unencrypted persistence cookies to infer or identify additional network resources and potentially exploit vulnerabilities found in other devices present on the network.  

Threat Awareness – Microsoft Warns of Increased BEC Attack Tactics via File Hosting Services

Microsoft has recently observed more attack campaigns misusing file hosting services and which are increasingly using defense evasion tactics involving files with restricted access and view-only restrictions. They issued a warning in their threat intelligence blog on Tuesday, explaining that these attacks are intended to compromise identities and devices, and usually lead to further business email compromise (BEC) attacks.

Vulnerability Awareness – Understanding and Safeguarding Against the Critical CUPS Vulnerabilities

New high-severity vulnerabilities have been disclosed in the Common Unix Printing System (CUPS), an open-source printing system widely used on Unix-like print servers (see below for a list of affected operating systems), allowing attackers to gain entry and take control of devices remotely. WaterISAC is sharing for member awareness of actively exploited critical vulnerabilities that may impact your utility and urges system admins to take swift action to mitigate this threat to help protect against remote hijacking attacks, data theft, and other serious attacks.

Pages

Subscribe to Cybersecurity