You are here

Cybersecurity

Threat Awareness – Iranian Threat Actor Mint Sandstorm Increasingly Targeting US Critical Infrastructure In 2023

Microsoft has posted a blog providing details on Mint Sandstorm, a threat actor group previously labeled PHOSPHORUS and who is believed to be associated with the Islamic Revolutionary Guard Corps, the intelligence arm of Iran’s military. Over the past year, the group has shifted from network reconnaissance activities to actively targeting U.S. critical infrastructure, including the energy, transportation systems, and chemical sectors.

New WaterISAC Champion - Luminary Automation, Cybersecurity and Engineering, LLC

WaterISAC continues to expand its list of Champions with Luminary Automation, Cybersecurity and Engineering, LLC (Luminary A.C.E.). Luminary A.C.E. is a certified minority-owned and veteran-owned cybersecurity consulting, technology, and engineering firm. They act as a vendor-neutral strategic partner for water and wastewater utilities by assessing, implementing, and managing OT infrastructure to increase operational resilience and cybersecurity readiness. 

Cyber Resilience – Wargaming as a Powerful Tool to Help Build Incident Response Playbooks

Help Net Security has written an article discussing the merits of wargaming to help build well-practiced data breach response processes. The author argues that drilling a wide variety of “what if” scenarios is an effective way for security teams to add new annexes to their existing incident response playbooks, as well as practice emergency communications in a risk-free environment.

Study: Insider Threat Caused by Workers Using Former Employers’ Passwords

PasswordManager has written an article discussing a survey of 1000 U.S. workers the site conducted to better understand employee password hygiene after leaving their company. According to the report, 47 percent of respondents still used their employers’ passwords after leaving the company; 56 percent of which did so for their personal use.

Security Awareness – Zero-Days Increase in Popularity for Ransomware Groups

Kaspersky’s SecureList has published a blog detailing an observed Nokoyawa ransomware attack utilizing a previously unknown Microsoft vulnerability. While the use of zero-days is mostly associated with nation-state threat groups, the actors behind Nokoyawa ransomware are known for their technical sophistication and tendency to utilize exploits targeting the Common Log File System, of which the zero day was associated with.

Pages

Subscribe to Cybersecurity