You are here

Cybersecurity

CISA Encourages Users and Administrators Update Vulnerable F5 BIG-IP and BIG-IQ Devices

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review an F5 advisory regarding multiple CVEs impacting BIG-IP and BIG-IQ devices and install updated software as soon as possible. CISA emphasizes that four of the CVEs involve critical remote code execution vulnerabilities, whereby an attacker could exploit these to take control of an affected system. Two related CVEs are buffer-overflow vulnerabilities.

Oldsmar City Officials Identify Areas for Improvement following Water Treatment Plant Compromise

The water treatment plant compromise in Oldsmar, Florida on February 5 led city officials to reassess and upgrade security measures at the facility, some of which are starting to be disclosed. Last week, the city council unanimously approved an upgrade for the plant’s supervisory controls and data acquisition software that allows a local firm to replace the facility’s current computers and software. It will also install a “simplified yet robust program” used by other local utilities, including a nearby electric utility, as well as install additional security.

FBI PIN: Malicious Actors Almost Certainly Will Leverage Synthetic Content for Cyber and Foreign Influence Operations

The FBI has published a Private Industry Notification (PIN) advising that malicious actors will almost certainly leverage synthetic content for cyber and foreign operations in the next 12-18 months. The FBI reports that foreign actors are already using synthetic content in their influence campaigns and that they and criminal cyber actors will increasingly use this material for spear phishing and social engineering in an evolution of cyber operations tradecraft.

Blended Threat Awareness – Cyber Attackers Compromise Security Cameras

Used across multitude of facilities, often unmanaged and connected to the corporate network with little to no security, surveillance cameras provide an avenue for compromise. Compromise that usually leads to serious privacy concerns, but also opens the lens of access to the broader corporate network and for launching future attacks against customers. Attackers claim to have obtained privileged credentials for a high-level administrator at Verkada, an enterprise security camera solutions company.

CISA Awards Grant for State, Local, Tribal, and Territorial Government IT Guidance and Best Practices Pilot Program

The Cybersecurity and Infrastructure Security Agency (CISA) has awarded the Center for Infrastructure Assurance and Security (CIAS) at the University of Texas at San Antonio a $1.2 million grant to conduct a pilot program to help state, local, tribal and territorial governments identify high value assets (HVA) to prioritize resources and planning. The pilot will aid these governments in establishing an HVA program that aligns with the federal government’s while maintaining the flexibility needed to incorporate their individual needs.

Joint NSA and CISA Guidance on Strengthening Cyber Defense Through Protective DNS

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released a Joint Cybersecurity Information (CSI) sheet with guidance on selecting a protective Domain Name System (PDNS) service as a key defense against malicious cyber activity. Protective DNS can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking known-malicious domains.

Latest VPN Breaches Reinforce Importance of Trusting Your Provider

Detailed credentials for more than 21 million VPN users were swiped and advertised for sale online last week, offered by a cyber thief who allegedly stole user data collected by the VPN providers themselves. The data includes email addresses, randomly generated password strings, payment information, and device IDs belonging to users of three VPNs that offer their services for free – SuperVPN, GeckoVPN, and ChatVPN. While shocking, the unfortunate truth about the recent VPN data leak is that this type of data mishap is nothing new.

Pen Tester Shows Weaknesses at Nuclear Plant

In a recent interview published by Trustwave, a pen tester proved that even a well-protected nuclear power plant could use a cybersecurity tune up. Consultant Charles Hamilton reported that he had encountered a low-security Wifi hot-spot at his client’s facility set up by contractors.  From there, he was able to gain access to the network and some monitoring tools. Within two hours, he and domain-level access.

Pages

Subscribe to Cybersecurity