You are here

Cybersecurity

Security Awareness – Voice Mail Themed Campaign Targeting Office 365 and Outlook Users

An ongoing phishing campaign targeting U.S. organizations has been observed employing fake voicemail notifications to fool employees into providing their Office 365 or Outlook credentials. In this specific phishing campaign, users receive a phony email stating they have a new voicemail to listen to and are prompted to open an HTML attachment. To increase the chances of success, adversaries ensure the email's “From” field specifically references the targeted organization’s name.

Threat Awareness – Microsoft 365 AutoSave Features Can be Exploited to Encrypt Files

Security researchers have uncovered a potential new ransomware-related threat to Office 365 account users. In this case, adversaries could utilize compromised Office 365 accounts to encrypt files stored in SharePoint and OneDrive cloud services. The attack relies on manipulating the “AutoSave” feature which creates cloud backups of older file types when users make edits. To conduct this attack threat actors need only to compromise an employee’s Office 365 account, usually done via phishing or malicious OAuth apps.

Threat Awareness – New Report Highlights Increasing Phishing Attacks

The first quarter of this year saw the most phishing attacks ever observed, according to a new report. The APWG Phishing Activity Trends Report for the first quarter of 2022 revealed there were 1,025,968 total phishing attacks. This quarter was the first time the three-month total number of phishing attacks exceeded one million. In March alone there were 384,291 attacks, which was also a record monthly total. The report identified webmail services as one of the most targeted sectors.

Cyber Resilience – Performing Asset Inventories

Conducting asset inventories is one of the foundational first steps in setting up a cyber risk management strategy. Since you cannot defend or secure what you do not know you have, performing asset inventories to gain network visibility is critical for all organizations large and small. Despite the overwhelming benefits of performing asset inventories, a recent report from the cybersecurity firm CYREBRO found that many organizations lack full network visibility. Network visibility is a clear awareness of the components, devices, servers, and data that make up a company’s network.

CISA Needs YOUR Help for Greater Cyber Resilience! – Request for Participation

Collaborative defense and information sharing is most effective when we all work together; otherwise, it’s just a one-way flow of information, and the providers are left wondering if their efforts are useful to the constituents. In that respect, CISA offers numerous no-cost products and services, including various types of assessments to critical infrastructure entities. Historically, the water and wastewater sector has been one of the largest groups (typically second only to the electricity sector) availing themselves of CISA’s services.

Pages

Subscribe to Cybersecurity