You are here

Cybersecurity

Quarterly Incident Survey (July to September 2021)

In support of its mission to identify threats to the water and wastewater sector, WaterISAC is asking utilities to respond to its survey asking about physical and cyber incidents and suspicious activities they've experienced in the past quarter, from July 1 to September 30, 2021. WaterISAC will aggregate, make confidential*, and share with members the information collected from the survey in its next Quarterly Water Sector Incident Summary report. The response deadline is Friday, November 5, 2021.

TLP:WHITE Joint Advisory Regarding Ongoing Cyber Threats to U.S. Water and Wastewater Systems

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Agency (CISA), the Environmental Protection Agency (EPA), and the National Security Agency (NSA) released a joint advisory (AA21-287A) today highlighting malicious cyber activity targeting the U.S. water and wastewater sector. The advisory captures threat activity against information technology (IT) and operational technology (OT) networks, systems, and devices. WaterISAC collaborated on the advisory.

Third Party Data Breaches Impact Companies Up and Down the Supply Chain

A recent report from the cybersecurity firm BlueVoyant underscores the increasing number of third party data breaches that are affecting businesses up and down the supply chain. The report, Managing Cyber Risk Across the Extended Vendor Ecosystem, found that around 93 percent of organizations having experienced a direct data breach over the past year have been so damaging because they propagated throughout the compromised vendor’s supply chain.

Cyber Readiness – International Organizations Publish New Guidance

The Australian Government just released its Ransomware Action Plan to confront the increasing threat posed by ransomware threat actors. The plan describes the capabilities and authorities that Australia will employ to tackle the ransomware menace and provides information for ransomware victim’s seeking help. Specifically, the plan calls for legislation mandating ransomware incident reporting, creating specific stand-alone offense for all forms of cyber extortion, and creating a stand-alone aggravated offence for cybercriminals who target critical infrastructure.

Cybersecurity Awareness Week 2: Three Fundamentals for Shoring Up Phishing Defenses

This post is leveraged from the CSAM Champions resources and is recommended to be provided to end users.

From ransomware to SolarWinds, the cyber threat landscape has been as hectic as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on the horizon, phishing – one of the oldest pain points in cybersecurity – is continuing to wreak havoc, and is as big of a threat as it has ever been.

Siemens [Virtual] Executive Cybersecurity Forum for Water and Wastewater: Thursday, Oct 14

On Thursday, WaterISAC’s Michael Arceneaux will open the Siemens Executive Cybersecurity Forum for Water and Wastewater. At this free, virtual event, Michael will talk about how the cybersecurity landscape has changed in the last several months, what the future may hold in terms of regulations and resources, and what opportunities may be ahead for the sector.

End User Protection - Microsoft Scheduled to Disable Excel 4.0 XLM Macros by Default

Macros have been a long time favorite of users and threat actors alike. Unfortunately, the same automation that macros afford users for efficiency and convenience have also been abused by threat actors to launch cyber attacks - most notably, Excel 4.0 XLM macros in phishing emails. Some organizations globally disable macros, but for those that have not, be advised that Microsoft will begin disabling Excel 4.0 XLM macros by default in Microsoft 365 tenants. This action is designed to protect users from the less secure macros that are still in use (and abuse) today.

Cybersecurity Awareness – The Key to Reduce Phishing Starts in the Mind

While phishing continues to be one of the most common cyber attack techniques – through training and awareness – it is also one of the easiest threats to reduce the likelihood of success. In the interest of Cybersecurity Awareness Week 2, Fight the Phish, IBM’s SecurityIntelligence has a good post on how the key to fight phishing starts in the mind.

Pages

Subscribe to Cybersecurity