You are here

Cybersecurity

Threat Awareness – Phishing Campaign Sets Sights on C-Suite

In a recent report from Menlo Security, it was discovered that “Indeed,” a widely recognized global job search platform headquartered in the U.S., boasting over 350 million monthly visitors and a global workforce of more than 14,000 employees, has become the focus of a significant phishing campaign. This campaign underscores the pervasive threat of abusing trust and how actors exploit credible and popular platforms.

Ransomware Resilience – Incomplete Remediation Results in Ransomware Reinfection

According to a recent report from Malwarebytes, ransomware attacks don't typically originate as a fresh problem for organizations; instead, they are largely the grim culmination of unresolved network compromises and inefficient security controls. According to the report, threat actors gain initial access through stolen login credentials, deployed malware, or established backdoors. The report notes that the majority of reinfections stem from the failure to address underlying vulnerabilities that led to the initial breach and improper remediations.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – October 5, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases Three Industrial Control Systems Advisories

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

Security Awareness – AI Makes Difficult to Detect Emails Even More Challenging

In a report by Egress, researchers found that human-generated phishing campaigns are getting harder to detect, with a 24.4% increase in obfuscation techniques integrated into over half (55%) of phishing emails in 2023. These techniques have also grown in sophistication, with almost half (47%) of phishing threat actors deploying two obfuscation layers, while less than one-third (31%) use only one technique.

Pages

Subscribe to Cybersecurity