You are here

Cybersecurity

CISA and FBI Publish Joint Advisory on QakBot Infrastructure

CISA and the FBI have released a joint Cybersecurity Advisory (CSA), Identification and Disruption of QakBot Infrastructure, to help organizations detect and protect against newly identified QakBot-related activity and malware. Originally used as a banking trojan to steal banking credentials for account compromise, QakBot has since grown to deploy multiple types of malware, trojans, and highly-destructive ransomware variants targeting the U.S.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – August 29, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases One Industrial Control Systems Advisory

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

EPA Distributes Advisory Emphasizing Importance of Addressing Barracuda ESG Vulnerability

Yesterday, the EPA distributed a medium cybersecurity advisory (attached) emphasizing the recent FBI FLASH regarding Suspected People’s Republic of China (PRC) Cyber Actors Continue to Globally Exploit Barracuda Email Security Gateway (ESG). The EPA advisory recommends all drinking water and wastewater systems address and follow the mitigations contained in the FLASH.

Network Defense – Think of Network Intruders Like Tourists Giving Themselves Away

This recent post by Brian Krebs is an interesting read for everyone, but security analysts, sysadmins, and other network defenders particularly should find this perspective interesting. This article suggests that a great many initial intrusions that lead to data theft could be nipped in the bud if more organizations started looking for the telltale signs of newly-arrived cybercriminals behaving like network tourists and how doing so can mean the difference between catching a compromise in week-1 (before the attackers dig in) and learning about the attack on CNN.

Pages

Subscribe to Cybersecurity