You are here

Cybersecurity

Security Awareness - It's All About Us

With data breaches being commonplace, Tripwire offers a post reminding us of the role people play in preventing or enabling breaches and other cybersecurity incidents. Most studies over the last few years have consistently revealed that human error is responsible for well over 75% of cybersecurity and privacy breaches. While technology controls are an important part of an overall cybersecurity strategy, technology does fail from time-to-time, and when it does, people become the last (and best) cybersecurity defense.

Emerson DeltaV DCS Workstations (ICSA-18-228-01) – Product Used in the Energy Sector

The NCCIC has released an advisory on uncontrolled search path element, relative path traversal, improper privilege management, and stack-based buffer overflow vulnerabilities in Emerson DeltaV DCS Workstations. DeltaV versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, and R5 are affected. Successful exploitation of these vulnerabilities could allow arbitrary code execution, malware injection, or malware to spread to other workstations. Emerson recommends users patch the affected products.

Tridium Niagara (ICSA-18-191-03)

The NCCIC has released an advisory on path traversal and improper authentication vulnerabilities in Tridium Niagara. Niagara AX Framework version 3.8 and prior and Niagara 4 Framework version 4.4 and prior are affected. Successful exploitation of these vulnerabilities could crash the device being accessed; a buffer overflow condition may allow remote code execution. Tridium has provided updates to address the vulnerabilities. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Cyber Resilience and Security Awareness – Is Your Current Approach Effective?

As the TVA post highlights, company-wide awareness training has proven a success in their overall cyber resilience strategy. Email security firm, Mimecast shares a relevant post on the downsides to the lack of security awareness training and proposes a more balanced approach to prevent security fatigue. When evaluating current awareness programs, consider that security awareness should be convincing, engaging, and challenging – not obvious and boring.

Critical Infrastructure Cybersecurity - One of America’s Biggest Utility’s Shares Cybersecurity Journey

With a layered and isolated cyber defense strategy in place, Tennessee Valley Authority (TVA) states that despite the tens of thousands of attempts per day, including those conducted by nation states, they have not had any events that have impacted their operational capability. TVA, America’s largest government owned power utility, is considered one of the prime targets for a cyber attack.

Microsoft Releases August 2018 Security Update

Microsoft has released its monthly update to address vulnerabilities in its software. For this month, Microsoft has released security updates for Internet Explorer, Microsoft Edge, Microsoft Windows, Microsoft Office and Microsoft Office Services and Web Apps, ChakraCore, Adobe Flash Player, .NET Framework, Microsoft Exchange Server, Microsoft SQL Server, and Visual Studio. Microsoft.

Siemens Automation License Manager (ICSA-18-226-03) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on relative path traversal and improper input validation vulnerabilities in Siemens Siemens Automation License Manager. For Automation License Manager 5, all versions prior to 5.3.4.4 are affected. For Automation License Manager 6, all versions prior to 6.0.1 are affected. Successful exploitation of these vulnerabilities could allow remote code execution or allow an attacker to determine port status on another remote system. Siemens has released updates to address these vulnerabilities.

Accenture – Cyber Threatscape Report 2018

Global technology consulting firm Accenture released their Cyber Threatscape Report 2018. The report highlights five key areas influencing the cyber threat landscape, including the expectation of Iran-based threat actors and groups to continue their malicious activity and increase capabilities for the foreseeable future, they also suggest the increased repurposing of popular malware could lead to the use of ransomware for destructive purposes by Iranian state-sponsored organizations.

Pages

Subscribe to Cybersecurity