You are here

Cybersecurity

WaterISAC’s ‘15 Cybersecurity FUNdamentals Awareness Month’ (15CFAM) Continues – Having More FUN Safeguarding Systems and Administering Access

Welcome back to ‘15 Cybersecurity Fundamentals Awareness Month’ (15CFAM), WaterISAC’s supplement to National Cybersecurity Awareness Month (NCSAM). 15CFAM aims to walk through WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities. Today we saunter among safeguarding systems from unauthorized access and exposure from cyber and physical threats.

Johnson Controls Sensormatic Electronics American Dynamics Victor Web Client (ICSA-20-282-01)

CISA has published an advisory on an improper authorization vulnerability in Johnson Controls Sensormatic Electronics American Dynamics Victor Web Client. All versions up to and including v5.4.1 are affected. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to delete arbitrary files on the system or render the system unusable through a denial-of-service attack. Johnson Controls recommends users upgrade all versions of victor Web Client to v5.6. CISA also recommends a series of measures to mitigate this vulnerability.

CISA FY2019 Risk Vulnerability Assessment Infographic

The U.S. Department of Homeland Security Cybersecurity and Information Security Agency (CISA) has released an infographic mapping analysis of 44 of its Risk and Vulnerability Assessments (RVAs) conducted in Fiscal Year 2019 to the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) Framework. The infographic identifies routinely successful attack paths CISA observed during RVAs conducted across multiple sectors. Cyber attackers can use these attack paths to compromise organizations.

WaterISAC’s ‘15 Cybersecurity FUNdamentals Awareness Month’ (15CFAM) – Having FUN Assessing Risks

Welcome back to our homage to National Cybersecurity Awareness Month (NCSAM) with the WaterISAC ‘15 Cybersecurity Fundamentals Awareness Month’ (15CFAM) where we walk through WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities. Today we are touching on risk assessments.

CISA Alert: Emotet Malware

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has published an alert on the Emotet malware. In the alert, CISA states that since August there has been a significant increase in malicious cyber actors targeting state and local governments with Emotet phishing emails. It emphasizes that this increase has rendered Emotet one of the most prevalent ongoing threats.

Australian Cyber Security Centre Notes Increase in Ransomware Incidents

The Australian Cyber Security Centre (ACSC) has released a special report on ransomware, noting it has observed an increase in the number of these incidents affecting Australian organizations and individuals. Some of the most significant takeaways from the report include that most ransomware incidents occurred after other malicious activity has been conducted against an organization (e.g. phishing campaigns) and that all sectors and individuals with information of value are potential targets for cyber criminals seeking opportunities for financial gain.

Europol’s Annual Cyber Crime Report Discusses Effects of COVID-19 and Evolving and New Trends

Europol has just released its annual Internet Organised Crime Threat Assessment, in which it reports on the latest trends and current impacts of cyber crime within the European Union and beyond. The report emphasizes the impacts the COVID-19 has had on the cyber threat landscape. It notes that the pandemic demonstrated how cyber criminals take advantage of society when it’s most vulnerable, enhancing many existing cyber threats and challenges.

National Cybersecurity Awareness Month 2020, Week One – If You Connect It, Protect It

National Cybersecurity Awareness Month 2020’s Week 1 theme, “If You Connect It, Protect It” seems fitting this year. With widespread and persistent remote working, there is no telling how many home routers, wireless access points, mobile devices, gaming systems, toasters, coffeemakers, and baby monitors have unintentionally been connected to corporate networks. Left unsecured, these hostile foreign devices are not only vulnerable to a plethora of cyber threats, but they also have the potential to wreak havoc on enterprise networks, home networks, and the internet at large.

Pages

Subscribe to Cybersecurity