You are here

Cybersecurity

Security Awareness – Continued use of “Adversary-in-the-Middle” (AitM) Attacks Expected to Continue

As Phishing-as-a-Service (PhaaS) offerings have lowered the barrier to entry for low-skilled threat actors, “Adversary-in-the-Middle” (AitM) attacks have become much less technical to execute. Open-source toolkits such as “EvilGinx3,” make phishing campaigns accessible to the most novice threat actors. With such frameworks, actors can easily create custom Office 365 login pages; mimic other popular websites such as Amazon, LinkedIn, Facebook, and X (formerly Twitter) to conduct opportunistic or highly targeted phishing campaigns.

Cyber-Physical Security Awareness – Effective Social Engineering Tricks that Still Work

Do you ever get the feeling users still don’t believe or understand how easy it is for threat actors to find information to use against them and/or our organizations? Or about how trivial it is for threat actors to blend in with normal activity? Are you fascinated or flabbergasted that the most simplistic good ol’ fashioned social engineering tricks (cyber or physical) are still successful after all these years?

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – January 9, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases One Industrial Control Systems Advisory

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

Cyber Resilience - WaterISAC’s Monthly Cyber Threat Briefing Gets New Name to Better Reflect Mission

‘Tis the season for fresh starts. To that end, WaterISAC is announcing the rebranding of its monthly Cyber Threat Briefing. While it will certainly continue to offer briefings on active threats and vulnerabilities or relevant incidents as appropriate, the slight name change will more closely embody the varied cyber resilience content this monthly webinar has been providing.

Pages

Subscribe to Cybersecurity