You are here

Cybersecurity

Passthrough – Rockwell Automation Encourages Customers to Assess and Secure Public-Internet-Exposed Assets

CISA shared the following in an alert sent out today:

Rockwell Automation has released guidance encouraging users to remove connectivity on all Industrial Control Systems (ICS) devices connected to the public-facing internet to reduce exposure to unauthorized or malicious cyber activity.

From Rockwell Automation:

Passthrough – (TLP:CLEAR) MS-ISAC Report on How GenAI can be Coerced into a Malicious Response

MS-ISAC, in coordination with the Elections Infrastructure ISAC (EI-ISAC), recently released a cyber threat intelligence (CTI) report titled: An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms. The report covers the testing conducted by the Center for Internet Security’s (CIS) Cyber Threat Intelligence team to understand how threat actors can leverage GenAI platforms, circumvent usage policies, and generate elections-focused phishing emails.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – May 21, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases One Industrial Control Systems Advisory

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

Risk Awareness – Concerns of Session Token Vulnerabilities of FIDO2 Authentication

While FIDO2 is “phishing-resistant” to credential stealing, it was also designed with the intent to further protect against session hijacking and man-in-the-middle (MiTM) attacks. Silverfort suggests that most applications do not protect the session tokens created after FIDO authentication is successful and that many identity providers are still vulnerable to MiTM and session hijacking attack types.

Passthrough – CISA Updates Public Safety Communications and Cyber Resiliency Toolkit

CISA recently updated its Public Safety Communications and Cyber Resiliency Toolkit with nine additional resources including an interactive graphic. The toolkit is designed to assist public safety agencies and others responsible for communications networks by providing the tools necessary to evaluate current resiliency capabilities.

Ransomware Resilience – NCSC Shares Guidance for Organizations Considering Payment in Ransomware Incidents

Analyst Comment (Jennifer Lyn Walker): The decision to pay or not to pay a ransomware extortion demand isn’t always as straightforward as we’d like. The NCSC puts forth some poignant considerations. Members are strongly encouraged to incorporate these considerations into ransomware response plans and discuss them with leadership BEFORE you experience a ransomware incident.

Pages

Subscribe to Cybersecurity