You are here

Cybersecurity

Threat Awareness – Google AMP URLs Being Abused to Generate Trust for Phishing Campaigns

Cofense shares recent analysis diving into a new phishing tactic that utilizes Google Accelerated Mobile Pages (AMP), an open-source HTML framework for browser and mobile websites. By using websites hosted on Google AMP URLs, threat actors are able to gain trust with users who think they are accessing a Google domain. This tactic is designed to steal login credentials of enterprise employees and has been successful at bypassing secure email gateways to reach users inboxes.

ICS Ransomware Trends – Dragos Analyzes ICS Ransomware Attacks for Q2 2023

Dragos continues tracking ransomware incidents impacting industrial organizations and has published its latest findings for Q2 2023. Overall, ransomware activity targeting industrial organizations and infrastructure is sustaining its trend upward resulting in more incidents and new or rebranded threat groups compared to last quarter. Dragos called it “an exceptionally active period” and assesses with moderate confidence that the current trend will continue.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins –August 1, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases One Industrial Control Systems Advisory

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

CISA and Partners Release Joint Cybersecurity Advisory on Preventing Web Application Access Control Abuse

The Australian Cyber Security Centre, the U.S. Cybersecurity and Infrastructure Security Agency, and the U.S. National Security Agency have released a joint Cybersecurity Advisory to warn vendors, designers, and developers of web applications and organizations using web applications about insecure direct object reference (IDOR) vulnerabilities.

H2OSecCon Sponsorship Opportunities Now Available!

Expand your exposure and support this one-of-a-kind virtual event focused on security for the water and wastewater sector. The 2nd annual H2OSecCon will be held virtually from October 19 - 20. This conference brings together hundreds of attendees from water and wastewater utilities to provide panels and sessions around IT and OT security, physical security, and resilience. Sponsorships start at $1,500. Full prospectus with pricing and details can be found in the PDF below.

Cyber Resilience – CISA Announces Effort to Create Sector-Specific Cybersecurity Performance Goals

CISA is working with Sector Risk Management Agencies (SRMAs) to directly engage with each critical infrastructure sector to develop Sector-Specific Goals (SSGs). In most instances, these goals will likely consist of either new, unique goals with direct applicability to a given sector, or materials to assist sector constituents with effective implementation of the existing cross-sector CPGs.

Pages

Subscribe to Cybersecurity