You are here

Cybersecurity

ICS/OT Cyber Resilience – Federal and International Partners Release Guidance on Principles of OT Cybersecurity for Critical Infrastructure Organizations

On Tuesday, CISA, the FBI, and the NSA joined eight international partners to publish a guide for critical infrastructure organizations called “Principles of Operational Technology Cyber Security”. The guidance is primarily for the water, energy, and transportation sectors and outlines six principles to be used in the creation of a safe and security-minded OT environment.

Joint Cybersecurity Advisory – Iranian Cyber Actors Targeting Personal Accounts to Support Operations

On Friday, the FBI and the UK’s National Cyber Security Centre (NCSC), along with other federal and international partners, published a joint Cybersecurity Advisory titled “Iranian Cyber Actors Targeting Personal Accounts to Support Operations”. The advisory highlights the continued malicious cyber activity by cyber actors working on behalf of the Iranian Government’s Islamic Revolutionary Guard Corps (IRGC) and draws attention to a spear phishing campaign carried out by these threat actors.

Cybersecurity Awareness Month 2024 – Secure Our World

October is Cybersecurity Awareness Month, a global effort to help everyone stay safe and protected when using technology whenever and however you connect. Cybersecurity Awareness Month is co-led by the National Cyber Security Alliance and CISA and is designed to engage and educate public and private-sector partners through events and initiatives with the goal of raising awareness about cybersecurity to increase the resiliency of the nation.

New Joint Guide – ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises

Today, the Australian Signals Directorate Australian Cyber Security Centre (ASD ACSC), CISA, and other U.S. and international partners released the joint guide “Detecting and Mitigating Active Directory Compromises”. This guide informs organizations of recommended strategies to mitigate common techniques used by malicious actors to compromise Active Directory.

Pages

Subscribe to Cybersecurity