You are here

Cybersecurity

Scammers Prey on Kindness during Disasters

With all the disasters that have happening, or that are still happening, the Federal Trade Commission (FTC) reminds the public that shameless scammers will try to leverage these events to steal money. As people open their hearts and wallets to help people and causes, it advises them to consider a list of tips for safe giving. The FTC posting also includes a video, a separate website with more tips on how to spot and avoid charity scams, and where to file a complaint.

GE Reason S20 Ethernet Switch (ICSA-20-266-02) – Products Used in the Energy Sector

CISA has published an advisory on a cross-site scripting vulnerability in GE Reason S20 Ethernet Switches. All firmware versions prior to 07A06 are affected. Successful exploitation of these vulnerabilities could allow unauthorized accounts manipulation and allow for remote code execution. GE recommends that S20 users upgrade to firmware Version 07A06 or higher to fix this vulnerability. CISA recommends a series of measures to mitigate the vulnerability.

GE Digital APM Classic (ICSA-20-266-01) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on authorization bypass through user-controlled key and use of a one-way hash without a salt vulnerabilities in GE Digital APM Classic. Versions 4.4 and prior are affected. Successful exploitation of these vulnerabilities could allow access to sensitive information. GE Digital APM Classic 4.5 contains mitigations for these vulnerabilities. GE Digital recommends all users upgrade to GE Digital APM Classic 4.5 or newer. CISA recommends a series of measures to mitigate the vulnerabilities.

CISA Alert: LokiBot Malware

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has published a new alert about the LokiBot malware, which it notes it has observed a notable increase in the use of by malicious cyber actors since July 2020. According to the alert, LokiBot uses a credential- and information-stealing malware, often sent as a malicious attachment and known for being simple, yet effective, making it an attractive tool for a broad range of cyber actors across a wide variety of data compromise use cases.

CISA Strongly Recommends Patching Critical Vulnerability in Microsoft Windows Netlogon Remote Protocol

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has released Emergency Directive (ED) 20-04 addressing a critical vulnerability – CVE-2020-1472 – affecting Microsoft Windows Netlogon Remote Protocol. ED 20-04 applies to federal government departments and agencies, requiring that they apply updates and report completion to CISA by Wednesday, September 23.

Drupal Releases Security Updates – Updated September 17, 2020

September 17, 2020

Drupal has released security updates to address vulnerabilities in Drupal 7.x, 8.8.x, 8.9.x, and 9.0.x. An attacker could exploit some of these vulnerabilities to obtain sensitive information or leverage the way HTML is rendered. CISA encourages users and administrators to review the following Drupal security updates and apply the necessary updates. Read the advisory at CISA.

Tags: 
us-cert drupal

FERC and NERC Publish Cyber Planning for Response and Recovery Study (CYPRES) Report

The Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) published a report this week on cyber planning for response and recovery that outlines best practices for the electric utility industry. The report includes observations on defensive capabilities and effectiveness of Incident Response and Recovery (IRR) plans. The report identifies common elements among the IRR plans and best practices of effective IRR plans.

FBI FLASH: Intrusion Activities of China-based Cyber Actors Associated with APT 41

The FBI has published a (TLP:WHITE) FLASH message providing technical details of cyber actors based in China, associated with APT 41, who have been indicted for computer intrusions affecting more than 100 victim companies in the U.S. and abroad. Some of the targeted victims were in the “government” industry. The FLASH describes how the actors used a wide range of tactics to gain initial access, including spear-phishing and by exploiting publicly identified security vulnerabilities, including those involving VPNs.

Pages

Subscribe to Cybersecurity