You are here

Cybersecurity

Building a Digital Defense with Browsers

The FBI’s Portland, Oregon office has published an advisory discussing best practices for web browsers, which are essential for operations in any organization but can serve as openings through which bad actors intrude into systems. Noting that the browsers that are available have different levels of privacy and security, the advisory encourages organizations spend time researching browsers to figure out which one meets their needs and expectations. Once a browser is selected, however, default settings can still leave an organization vulnerable.

Federal Commission Releases Report on Recommendations for Improving Cybersecurity

The Cyberspace Solarium Commission (CSC) has released its final report, which includes over 80 recommendations to improve the U.S.’s cybersecurity posture and practices. The recommendations in the report support six cybersecurity pillars: 1) Reform the U.S. Government’s Structure and Organization for Cyberspace; 2) Strengthen Norms and Non-Military Tools; 3) Promote National Resilience; 4) Reshape the Cyber Ecosystem; 5) Operationalize Cybersecurity Collaboration with the Private Sector; and 6) Preserve and Employ the Military Instrument of National Power.

Security Awareness - ICS Component Vendor Impacted by Malware Due to Google Chrome “Feature”

Since version 76 (current version is 80), Google Chrome no longer displays the “https” and subdomain “www” to users in the address bar. A “feature” that miscreants are taking advantage to compromise legitimate websites with credit card and login skimming malware. Unfortunately, a PLC vendor in Spain reportedly fell victim to this technique that enabled skimming code to be injected into its website. This recent scheme, as reported by journalist Brian Krebs, uses the domain “htt.ps” to trick users into thinking they are seeing the “https://” they have been taught to look for.

Unpatched Microsoft Exchange Servers Vulnerable to CVE-2020-0688

CISA advises that Microsoft Exchange Servers affected by a remote code execution vulnerability, known as CVE-2020-0688, continue to be an attractive target for malicious cyber actors. A remote attacker can exploit this vulnerability to take control of an affected system that is unpatched. Although Microsoft disclosed the vulnerability and provided software patches for the various affected products in February 2020, advanced persistent threat actors are targeting unpatched servers, according to recent open-source reports.

Microsoft Releases March 2020 Security Updates

Microsoft has released its monthly update to address vulnerabilities in its software. For this month, Microsoft has released security updates for Microsoft Windows, Microsoft Edge (EdgeHTML and Chromium-based), ChakraCore, Internet Explorer, Microsoft Exchange Server, Microsoft Office and Microsoft Office Services and Web Apps, Azure DevOps, Windows Defender, Visual Studio, Open Source Software, Azure, and Microsoft Dynamics. Read the update at Microsoft.

Siemens Industrial Products with OPC UA (Update F) (ICSA-19-099-03) – Products Used in the Water and Wastewater and Energy Sectors

March 10, 2020

CISA has updated this advisory with additional information on the affected products. Read the advisory at CISA.

February 11, 2020

CISA has updated this advisory with additional information on the affected products and mitigating measures. Read the advisory at CISA.

January 14, 2020

Continued Cyber Concerns for Utilities Amid Coronavirus

As utilities exercise business continuity plans with staff working remotely during the coronavirus epidemic, it is important to include reminders to increase cyber vigilance and hygiene during this time as attackers are leveraging our heightened concern and curiosity to spread malware and other scams. Similar to vacation and holiday seasons when cybersecurity/IT staff may not be immediately available, an uptick in cyber attacks are likely to be met with less resistance during this time.

Nearly All Compromised Accounts Did Not Use MFA

During the recent RSA cybersecurity conference, Microsoft engineers said that 99.9 percent of the compromised accounts they’ve tracked don’t use multi-factor authentication (MFA). In most cases, the account hacks happen through simplistic attacks, which MFA is typically effective against. The primary sources of most hacks of Microsoft accounts was password spraying, when an attacker picks a common and easy-to-guess password, and goes through a long list of usernames until they get a hit and can access an account using said password.

Siemens S7-300/400 PLC Vulnerabilities (Update E) (ICSA-16-348-05D) – Product Used in Energy and Water and Wastewater Systems Sectors

March, 10, 2020

CISA has updated the advisory with additional details on the affected products and the nature of the vulnerability. Read the advisory at CISA.

January 25, 2018

ICS-CERT has updated this advisory with additional details on mitigation measures. ICS-CERT.

November 28, 2017

Pages

Subscribe to Cybersecurity