You are here

Cybersecurity

CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – August 20, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS security advisories, along with additional alerts, updates, and bulletins:

ICS Advisories:

  • There are no new ICS advisories to report

Additional Alerts, Updates, and Bulletins:

ICS/OT Ransomware – Dragos’s Most Recent Industrial Ransomware Analysis: Q2 2024

There was a notable rise in ransomware attacks targeting industrial organizations in the second quarter of 2024 compared to the prior quarter according to the “Dragos Industrial Ransomware Analysis: Q2 2024” report. The report highlights a significant resurgence in threat actor activity, with large ransomware groups such as Royal ransomware and the Knight groups, rebranding as BlackSuit and RansomHub, respectively.

Threat Awareness – Phishing Attack Highlights Shift in Infostealer Capabilities

A recent phishing attack has been observed using a new type of information stealing malware designed to exfiltrate a wide range of sensitive information. Once initiated, the malware targets not only traditional data types like saved passwords, but also session cookies, credit card information, Bitcoin-related extensions, and browsing history. It is engineered to collect comprehensive browser information and files, and then email the stolen data to various email domains owned by the attacker.

Cyber Resilience – Don’t Get Hooked, Phishing Can Still Bypass MFA

Develop a viable defense and threat actors will inevitably find a way to bypass it. That’s the endless game of cat-and-mouse, especially in the cybersecurity world. A historical example was the old advice to ‘never open an email from someone you don’t know,’ so threat actors now expertly purport to be or impersonate someone (or something, as in the case of a well-known brand) we do know. A more recent example concerns multifactor authentication (MFA).

Cyber Resilience – Don't be Soft about Hardware Security

A recent post at The Hacker News discusses the importance of proactive security measures to prevent attacks. Specifically, the post suggests that relying solely on software protections can often be inadequate for safeguarding valuable assets. Software protections are also challenging because software is inherently complicated allowing vulnerabilities to abound even in the very applications meant for security. This challenge serves as a reminder of the importance of applying a complimentary approach based on hardware security.

Cyber Resilience – VPN Exploitation, Don’t Blindly Trust Your VPN

From ransomware groups to state-sponsored actors, multiple cyber threat actor types are exploiting vulnerabilities on edge devices and remote services. Edge devices should be considered among the critical assets of any organization and the security of such devices should be one of the highest priorities. This includes VPNs, as a compromised VPN server could allow attackers to easily gain control over other critical assets in the network.

Pages

Subscribe to Cybersecurity