You are here

Cybersecurity

Cyber Resilience – NSA Urges Organizations to Implement Zero Trust in New Resource Sheet

The NSA has released a Cybersecurity Information Sheet titled “Advancing Zero Trust Maturity throughout the User Pillar” that provides recommendations for maturing identity, credential and access management (ICAM) capabilities. Noting the increased trend in threat actors targeting users and user accounts, the NSA promotes the use of the Zero Trust framework by organizations looking to achieve a more maturity cybersecurity posture.

Advisory: Potential for Mandatory Microsoft DCOM Patch to Disrupt SCADA Communications

Action may be Required: Tomorrow (March 14, 2023), it will no longer be possible to disable the Microsoft DCOM hardening patch. This could result in the disruption of critical communications between ICS/SCADA/OT devices.

In other words, if ICS/OT/SCADA devices suddenly stop communicating after applying the Microsoft DCOM patch from March 14, 2023, it may be practical to consider this as a possible cause during your troubleshooting efforts.

Threat Awareness – Keep Our Eyes on Emotet

Various cybersecurity firms have observed that everybody’s email enemy emerged after another routine respite. As Emotet has proven to be a resilient threat, researchers report that it resumed activity again on March 7. While Emotet is still leveraging email as its initial infection vector, it’s important for defenders to track the various behaviors it adopts during each resurrection and detect and protect accordingly. According to Cofense, for this round Emotet is attaching very large .zip files that are not password protected.

Cyber Resilience – How to Block Microsoft OneNote Files from Delivering Malware

Since mid-December 2022, threat actors have been increasingly exploiting Microsoft OneNote files to deliver malware and compromise victims. Last week, WaterISAC shared a DHS report on attackers successfully utilizing weaponized Microsoft OneNote files for malware distribution. Threat actors, including ransomware gangs, are actively using this delivery method to infect organizations.

Pages

Subscribe to Cybersecurity