You are here

Cybersecurity

Security Awareness – Threat Actors are not Tired of Pushing MFA Notification Prompts

Despite the benefits that MFA provides, cyber threat actors continue to use multiple techniques to bypass it. Last week, the Los Angeles County Department of Health Services disclosed a data breach caused by an MFA push notification spamming attack that is believed to have impacted roughly 47,000 individuals.

CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – June 25, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS security advisories, along with additional alerts, updates, and bulletins:

ICS Advisories

CISA Releases Two Industrial Control Systems Advisories for products used across multiple sectors, please check these latest advisories for specific equipment used across your ICS/SCADA environments and address accordingly:

CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – June 20, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS security advisories, along with additional alerts, updates, and bulletins:

ICS Advisories

CISA Releases Three Industrial Control Systems Advisories for products used across multiple sectors, please check these latest advisories for specific equipment used across your ICS/SCADA environments and address accordingly:

Threat Trend Awareness – Living on the Edge (of the Network Perimeter)

From ransomware groups to state-sponsored actors, multiple cyber threat actor types are exploiting vulnerabilities on edge devices, remote services, and other components that are exposed at the network edge (that shouldn’t be). It’s not just known vulnerabilities that are being exploited on devices that asset owners leave unpatched. Well-resourced and capable threat actors are increasingly developing complex zero-day exploits, making it particularly important to have a plan to protect these devices before those that are able can be patched.

Threat Awareness – Threat Actors Confound Users into Compromise via the Clipboard

Proofpoint posted research on an increase in a technique leveraging unique social engineering that directs users to copy and paste malicious PowerShell scripts to infect their computers with malware. Essentially, through the use of fake Google Chrome, Word, and OneDrive errors, users may be tricked into literally copying and pasting malicious PowerShell scripts into their Windows terminals.

Partner Resource – CISA and Partners Release Guidance for Modern Approaches to Network Access Security

WaterISAC is passing along this partner guidance for broader awareness to assist utilities with organizational cyber resilience efforts.

Today, CISA, in partnership with the Federal Bureau of Investigation (FBI), released guidance, Modern Approaches to Network Access Security, along with the following organizations: 

Pages

Subscribe to Cybersecurity