You are here

Cybersecurity

BEC Scammers Trick Employees into Giving Away Customer Information

Business email compromise (BEC) scammers are now targeting company customers using a new indirect attack method designed to collect information on future scam targets by asking for aging reports from collections personnel. Aging reports, also known as a schedule of accounts receivable, are sets of outstanding invoices which allow a company's financial department to keep track of customers who haven't yet paid services or goods.

National Cybersecurity Awareness Month Theme Announced

The National Cyber Security Alliance (NCSA) has announced the theme for this year’s National Cybersecurity Awareness Month (NCSAM), which is recognized every October.  With the overarching theme of “Own IT. Secure IT. Protect IT.,” the NCSA says NCSAM 2019 will focus on encouraging personal accountability and proactive behavior in security best practices and digital privacy and draw attention to careers in cybersecurity. As it has in past years, WaterISAC will distribute its own messaging using the NCSAM theme.

Mitsubishi Electric FR Configurator2 (ICSA-19-204-01)

The NCCIC has published an advisory on improper restriction of XML external entity reference and uncontrolled resource consumption vulnerabilities in Mitsubishi Electric FR Configurator2. Versions 1.16S and prior are affected. Successful exploitation of these vulnerabilities may enable arbitrary files to be read or cause a denial-of-service condition. Mitsubishi Electric has released Version 1.17T for the reported vulnerabilities. The NCCIC also advises of a series of measures for mitigating the vulnerabilities.

NREL EnergyPlus (ICSA-19-204-02) – Product Used in the Energy Sector

The NCCIC has published an advisory on a stack-based buffer overflow vulnerability in National Renewable Energy Laboratory (NREL) Energy Plus. Version 8.6.0 and prior versions (potentially) are affected. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code or cause a denial-of-service condition. It is recommended that users update the application to the latest available release, v9.0.1, or later. The NCCIC also advises of a series of measures for mitigating the vulnerabilities.

Building Resilience to Foreign Interference, Misinformation Activities

The U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) has published a series of documents as part of its efforts to address and build resilience to foreign interference, particularly information activities (e.g., disinformation and misinformation). The first document, The War on Pineapple: Understanding Foreign Interference in 5 Steps, is intended to illustrate how information operations have been carried out in the past to sow divisions in the U.S.

5G Wireless Network Risk Factors

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has published an infographic providing an overview of the risk factors associated with the deployment of 5G technology, the next generation of wireless networks. 5G is expected to bring security improvements and a better user experience, but supply chain, deployment, network security, and competition and choice vulnerabilities may affect the security and resilience of networks.

Johnson Controls exacqVision Server (ICSA-19-199-01)

The NCCIC has published an advisory on an unquoted search path or element vulnerability in Johnson Controls exacqVision Server. This vulnerability impacts exacqVision server versions 9.6 and 9.8. Successful exploitation of this vulnerability could allow an unauthenticated user to elevate their privileges. Johnson Controls recommends users upgrade to the latest product, version 19.03. The NCCIC also advises of a series of measures for mitigating the vulnerability. Read the advisory at CISA.

Pages

Subscribe to Cybersecurity