Security Awareness – You May Wish to (Re)Block Macros in Microsoft Office Documents
Microsoft has temporarily suspended a recently announced feature of auto blocking macros in Office files downloaded from the Internet.
Microsoft has temporarily suspended a recently announced feature of auto blocking macros in Office files downloaded from the Internet.
Organizations spend an extensive amount of time and money ensuring they are protected from cyber threats. However, organizations with robust cybersecurity defenses are still being compromised through their supply chains, demonstrating that you are only as strong as your weakest link. A survey from the polling agency Opinion Matters found that 97 percent of organizations have been negatively affected by a cybersecurity incident occurring in the supply chain. Organizations looking to strengthen their supply chain should consider utilizing a third-party risk management (TPRM) tool.
People use internet browsers every day to conduct business and for recreation. Unfortunately, browsers collect large amounts of sensitive user data which provide attractive targets for threat actors to exploit. Additionally, browsers are frequently updated with new features that increase the risk of vulnerabilities in the source code that adversaries can leverage to compromise systems. Relatedly, there are only two types of open source browser engines, Chromium and Mozilla Firefox.
The Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Department of the Treasury recently published a joint Cybersecurity Advisory (CSA) providing information on Maui ransomware, which has been utilized by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations.
The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:
ICS Vulnerability Advisories:
Seemingly everyday a new vulnerability or malware appears in the news heralding a new threat. However, despite the rise in cyber vulnerabilities and malware, humans remain the primary vector through which organizations are attacked and compromised. Thus, one of the most effective ways to manage this risk is to conduct frequent security awareness training courses. Awareness training helps cybersecurity professionals better manage human risk by altering how employees think about cybersecurity and teaching them to carefully consider their behaviors.
The U.K.’s National Cyber Security Centre (NCSC) recently issued guidance urging organizations to prepare for an extended period of heightened threat in relation to the Russia-Ukraine conflict. The NCSC assesses the cyber threat to the UK stemming from the conflict remains heightened and organizations are urged to not let their guard down. This new guidance specifically includes resources and tips to support staff resilience, as during an extended period of heightened cyber threat, systems, processes, and the workforce will come under increasing pressure.
The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:
ICS Vulnerability Advisories:
Alerts, Updates, and Bulletins:
Today, the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Department of the Treasury published a joint Cybersecurity Advisory (CSA) to provide information on the MedusaLocker ransomware. As noted in the CSA, MedusaLocker threat actors rely predominantly on vulnerabilities in Remote Desktop Protocol (RDP) to access victims’ networks.
The threat of compromise via firmware attacks is becoming an increasing concern for IT professionals. Between hybrid work models and continued reliance on legacy systems, it’s increasingly more challenging for IT staff to secure firmware on devices that may not be in the office or older systems that simply don’t support device security.