You are here

Cybersecurity

Threat Awareness – Microsoft Office365 Suite of Threats

As Office365 software applications continue to be used regularly by the majority of users in virtually all industries, the threats that lurk in the software suite affect practically all who use a computer, including systems administrators and users alike. While these threats are nothing new, certain developments have made them more dangerous – like how Microsoft started allowing the use of python scripts within Excel since September 2023 for instance, increasing the potential for malicious use.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – May 30, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases Seven Industrial Control Systems Advisories

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

Passthrough – Cisco Releases May 2024 Cisco ASA, FMC, and FTD Software Security Publication

Given widespread use, WaterISAC is passing through the following alert which incorporates patches that address previously reported on zero day vulnerabilities regarding ArcaneDoor. Cisco released a bundled publication for security advisories that address vulnerabilities in Cisco Adaptive Security Appliance (ASA), Firepower Management Center (FMC), and Firepower Threat Defense (FTD) software.

Cyber Resilience – 4-Steps to Mapping and Securing Organizational Critical Assets

One of the many challenges that cybersecurity teams of all sizes face, is knowing where to focus their limited efforts and resources. This is why one of the first things any cybersecurity team should be preoccupied with is obtaining a clear picture of the business-critical assets of their organization, and to maintain a proper inventory of the technology used – essentially mapping out the organization to identify the most needed areas to secure. In a recent article, The Hacker News shares a four-step approach to mapping and securing the most critical assets of an organization.

Threat Awareness – AI is Making Scams More Convincing

Not only are threat actors always modifying tactics making it imperative for security teams to maintain situational awareness and adapt training methods, but as of late, cybercriminals have been observed delivering more convincing scams by leveraging generative AI. As this does not come as a huge surprise per se, it is a threat worthy of our attention as scammers have been seen fooling even the savviest internet users and not just the elderly.

Threat Awareness – Threat Actors Target Insecure VPN Instances for Initial Access to Enterprise Networks

WaterISAC is sharing this recent threat actor behavior for member awareness. Threat actors have been identified targeting VPN solutions from various cybersecurity vendors for initial access into enterprise networks. Cybersecurity firm Check Point has monitored such login attempts where attackers leveraged old VPN local accounts with password-only authentication and don’t appear to involve exploitation of a software vulnerability.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – May 28, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

May 28 – CISA Releases One Industrial Control Systems Advisory

May 23 – CISA Releases One Industrial Control Systems Advisory

Pages

Subscribe to Cybersecurity