You are here

Cybersecurity

(TLP:CLEAR) WaterISAC – EPA: National Security Information Sharing Bulletin - Q1 2025

WaterISAC and EPA just published the latest quarterly edition of the National Security Information Sharing Bulletin. The Information Sharing Bulletin (ISB) is intended for water and wastewater utility owners and operators to provide information on priority security and resilience topics, including cybersecurity, physical security, and natural disasters.

(TLP:CLEAR) WaterISAC’s Traffic Light Protocol (TLP) Infromation Sharing Guidelines

Starting the week of January 27, 2025, WaterISAC is adopting the Traffic Light Protocol (TLP) information sharing guidelines for all its written products and webinars. The use of TLP aligns WaterISAC with the widely adopted international guidelines for sharing information and facilitating more frequent and effective collaboration. Several federal agencies, such as CISA and Office of the National Cyber Director (ONCD) use the TLP.

House Committee Hearing – Unconstrained Actors: Assessing Global Cyber Threats to the Homeland

During the House Committee Hearing held yesterday, four witnesses addressed the escalating threats posed by nation-state actors, particularly from the People’s Republic of China (PRC). They highlighted the increased sophistication and operational capabilities of these threat actors and noted a rise in cyber intrusions targeting U.S. critical infrastructure. Witnesses also cited recent incidents at water utilities.

Cyber Resilience – Tenable Analysis of Salt Typhoon and Exploited Vulnerabilities

Cybersecurity firm Tenable recently released an analysis of People’s Republic of China’s (PRC)-affiliated threat actor Salt Typhoon and examines the vulnerabilities and tactics employed by the group. Salt Typhoon has infiltrated at least nine U.S.-based telecommunications companies and has utilized various tactics, primarily exploiting vulnerabilities, to gain access.

Vulnerability Awareness – Joint Advisory on Ivanti Exploit Chains by Suspected Chinese Threat Actors

Yesterday, CISA and the FBI released a joint advisory that included technical details of at least two exploit chains used by threat actors to break into Ivanti Cloud Service Appliances (CSA). The advisory comes in response to active exploitation in Ivanti CSA of the following vulnerabilities:

Pages

Subscribe to Cybersecurity