You are here

Cybersecurity

Microsoft Releases Security Updates for Multiple Products

Microsoft has released security updates to address multiple vulnerabilities in products that use the Autodesk FBX library. These include Office 2016, Office 2019, Office 365 ProPlus, and Paint 3D. A remote attacker can exploit these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review Microsoft Advisory ADV200004 and apply the necessary updates.

FBI Alert on Extortion Email Scams

The FBI’s Internet Crime Complaint Center (IC3) has released an alert warning of a recent increase in extortion email scams. Cyber criminals threaten to release sexually explicit photos or videos of victims unless they agree to send payment. The alert provides additional characteristics of these scams and offers a list of tips for protection.

Inductive Automation Ignition (ICSA-20-112-01) – Product Used in the Energy Sector

CISA has published an advisory on an improper access control vulnerability in Inductive Automation Ignition 8 Gateway. Versions prior to 8.0.10 are affected. Successful exploitation of this vulnerability could allow an attacker to write endless log statements into the database, which could result in a denial-of-service condition. Inductive Automation recommends upgrading Ignition 8 Gateway to v8.0.10. If this isn’t possible, it recommends a series of workarounds. CISA also recommends a series of measures to mitigate the vulnerability.

FBI Official Says Cyber Crime Reports Quadrupled during COVID-19 Pandemic

Speaking in an online panel last week, FBI Deputy Assistant Director Tonya Ugoretz said the number of cyber crime reports received by the FBI’s Internet Crime Complaint Center (IC3) has quadrupled compared to months before the pandemic. "Whereas they might typically receive 1,000 complaints a day through their internet portal, they're now receiving something like 3,000 - 4,000 complaints a day. Not all of those are COVID-related, but a good number of those are,” said Ugoretz. She also described the kinds of activity that have been reported to the IC3. "They really run the gamut.

Telemetry Identifies Commodity Malware Infections Increase at Industrial Organizations

Advanced ICS-specific malware is limited to just a few samples such as TRISIS/TRITON, Stuxnet, CRASHOVERRIDE/Industroyer, and BlackEnergy2; however, countless reports and observations demonstrate commodity malware has been increasingly impacting industrial operations. ICS cybersecurity firm Dragos has identified an increase in malware infections at industrial companies globally throughout 2019 and the beginning of 2020. Notably, the LockerGoga, Emotet, and Ryuk infections of 2019 support this trend with their potential to create operational disruption.

CISA Alert: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching

The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has published an Alert that updates a previous alert, Continued Exploitation of Pulse Secure VPN Vulnerability (published on January 10), which advised organizations to immediately patch CVE-2019-11510 – an arbitrary file reading vulnerability affecting Pulse Secure virtual private network (VPN) appliances.

Policies and Procedures – So, We’re Working Remotely, Now What?

Infrastructure is being adapted and secured to support social distancing as staff work from home and essential on-site shifts are restructured to skeleton crews. The current worldwide health pandemic has forced nearly every organization to enact some sort of business continuity plan, whether they had one or not. Likewise, tested plans are being validated with actual experience. Whether an organization had a remote workforce policy in place or not, now is the time to pay it due attention, including the cybersecurity aspect.

Pages

Subscribe to Cybersecurity