You are here

Cybersecurity

CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – June 27, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS security advisories, along with additional alerts, updates, and bulletins:

ICS Advisories

CISA Releases Seven Industrial Control Systems Advisories for products used across multiple sectors, please check these latest advisories for specific equipment used across your ICS/SCADA environments and address accordingly:

Security Awareness – Threat Actors are not Tired of Pushing MFA Notification Prompts

Despite the benefits that MFA provides, cyber threat actors continue to use multiple techniques to bypass it. Last week, the Los Angeles County Department of Health Services disclosed a data breach caused by an MFA push notification spamming attack that is believed to have impacted roughly 47,000 individuals.

CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – June 25, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS security advisories, along with additional alerts, updates, and bulletins:

ICS Advisories

CISA Releases Two Industrial Control Systems Advisories for products used across multiple sectors, please check these latest advisories for specific equipment used across your ICS/SCADA environments and address accordingly:

CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – June 20, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS security advisories, along with additional alerts, updates, and bulletins:

ICS Advisories

CISA Releases Three Industrial Control Systems Advisories for products used across multiple sectors, please check these latest advisories for specific equipment used across your ICS/SCADA environments and address accordingly:

Threat Trend Awareness – Living on the Edge (of the Network Perimeter)

From ransomware groups to state-sponsored actors, multiple cyber threat actor types are exploiting vulnerabilities on edge devices, remote services, and other components that are exposed at the network edge (that shouldn’t be). It’s not just known vulnerabilities that are being exploited on devices that asset owners leave unpatched. Well-resourced and capable threat actors are increasingly developing complex zero-day exploits, making it particularly important to have a plan to protect these devices before those that are able can be patched.

Pages

Subscribe to Cybersecurity