You are here

Cybersecurity

Security Awareness and Blended Threats – Protecting Users from Cultural Event Scams, Phone Call Scams, and... Vacations?

In a security awareness trifecta, three leading cybersecurity organizations posted resources to help users recognize, understand, and avoid a few currently trending risks that affect our physical and digital lives. First, McAfee Labs explains the penchant for cyber actors in leveraging current physical events like The Olympics and World Cup, and the potential cyber implications to unwary fans.

Rockwell Automation Allen-Bradley Stratix 5950 (ICSA-18-184-01) - Products Used in Energy and Water and Wastewater Sectors

The NCCIC has released an advisory regarding several vulnerabilities affecting multiple Allen-Bradley Stratix 5950 Security Appliances running Cisco ASA v9.6.2 and earlier. The vulnerabilities include improper input validation, improper certificate validation, and resource management errors. Successful exploitation of these vulnerabilities could allow an attacker to bypass client certification to create connections to the affected device or cause the device to crash. These vulnerabilities are remotely exploitable.

Insider Threats – Myths and Misconceptions

As the concern over insider threats grows, SecurityWeek offers a post to help dispel some common myths and misconceptions for deterring, detecting, and responding. The post highlights the fact that this threat is not always malicious or intentional, but often unintentional and/or negligent. The difference between a formal insider threat program and the use of detection tools is also delineated.

New NCCIC Tip: Defending against Illicit Cryptocurrency Mining Activity

The NCCIC recently published Security Tip 18-002, Defending Against Illicit Cryptocurrency Mining Activity, which seeks to make aware its partners of the risks associated with cryptocurrencies and to help them avoid falling victim to cryptocurrency mining activity. This product describes crytpocurrency and cryptomining, explains the tactic of cryptojacking, and offers tips for how to protect systems and devices from this activity. These tips include checking systems privilege policies, uninstalling unused software, and creating and monitoring blacklists, among others.

Employee Impersonation - Usurping Trusted Relationships

Employees and contractors can become mere victims of a cyber attack. Often their actions are unintentional, but damaging nonetheless, when credentials are shared with others or stolen and used by attackers to illegally authenticate to valuable systems. Knowing how employees and contractors access your systems and the devices they use will help detect anomalous behavior attempting to impersonate these trusted relationships.

Protecting Industrial IoT Deployments from Enabling Blended Attacks

As industrial organizations embrace the Internet of Things (IoT), they must strike the proper balance between benefit and risk. SecurityWeek posts an article highlighting strategies to reduce the vulnerabilities inherent in Industrial IoT deployments from resulting in unintended consequences threatening safety and security. Having a robust asset management program is the first step and is foundational to protecting every network environment.

New NCCIC Tip: Securing Network Infrastructure Devices

The NCCIC recently published Security Tip 18-001, Securing Network Infrastructure Devices, noting that this equipment constitutes an ideal target for malicious cyber actors. Moreover, the NCCIC submits that many of these devices are easy targets for attackers because they are not maintained at the same security level as general-purpose desktops and servers. This Security Tip aims to address this issue by providing users and network administrators with steps they can take to better secure their infrastructure.

Delta Electronics Delta Industrial Automation COMMGR (ICSA-18-172-01) – Product Used in the Energy Sector

The NCCIC has released an advisory on a stack-based buffer overflow vulnerability in Delta Electronics Delta Industrial Automation COMMGR. COMMGR Version 1.08 and prior are affected. Successful exploitation of this vulnerability may allow remote code execution, cause the application to crash, or cause a denial-of-service condition in the application server.

Pages

Subscribe to Cybersecurity