You are here

Cybersecurity

Threat Awareness – MFA Bypass Attacks Keep Getting Easier to Execute

As Phishing-as-a-Service (PhaaS) offerings continue lowering the barrier to entry for low-skilled threat actors, “Adversary-in-the-Middle” (AitM) attacks have become much less technical to execute. Open-source toolkits make phishing campaigns accessible to the most novice threat actors. With such frameworks, actors can easily create custom Microsoft365 login pages and mimic other popular websites such as Amazon, Google, LinkedIn, Facebook, and X (formerly Twitter) to conduct opportunistic or highly targeted phishing campaigns.

Passthrough: Updated Joint Guide – Understanding and Responding to Distributed Denial-Of-Service Attacks

Today, CISA, the FBI, and MS-ISAC released an updated joint guide, Understanding and Responding to Distributed Denial-Of-Service Attacks, which addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The updated guidance now includes detailed insight into three different types of DDoS techniques:

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – March 21, 2024

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – March 21, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as other alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases One Industrial Control Systems Advisory

Passthrough: Biden-Harris Administration Engages States on Safeguarding Water Sector Infrastructure Against Cyber Threats

Earlier today, EPA Administrator Michael Regan and National Security Advisor Jake Sullivan sent a letter to all U.S. Governors inviting state environmental, health and homeland security Secretaries to a convening by their deputies to discuss the urgent need to safeguard water sector critical infrastructure against cyber threats.

(TLP:CLEAR) Joint Factsheet – PRC State-Sponsored Cyber Activity: Actions for Critical Infrastructure Leaders

Today, CISA—along with the NSA, FBI, and other U.S. government and international partners—published a joint fact sheet titled “PRC State-Sponsored Cyber Activity: Actions for Critical Infrastructure Leaders” which warns critical infrastructure leaders of the urgent risk posed by Volt Typhoon, the China state-sponsored threat actor, and provides guidance on specific actions to prioritize the protection of their organization from this threat activity.

Pages

Subscribe to Cybersecurity