You are here

Cybersecurity

ABB Relion 650 and 670 Series (ICSA-19-330-02) – Products Used in the Energy Sector

CISA has published an advisory on an improper input vulnerability in ABB Relion 650 and 670 Series. Numerous versions of both devices are affected. Successful exploitation of this vulnerability may allow an attacker to reboot the device, causing a denial of service. ABB indicates updating to later versions of the products can mitigate the vulnerabilities. It also offers other recommendations to further protect the devices. CISA also recommends a series of measures to mitigate the vulnerability.

ABB Relion 670 Series (ICSA-19-330-01) – Product Used in the Energy Sector

CISA has published an advisory on a path traversal vulnerability in ABB Relion 670 Series. Numerous versions are affected. Successful exploitation of this vulnerability may allow an attacker to read and delete files on the device. ABB indicates updating to current versions of the product can mitigate the vulnerabilities. It also offers other recommendations as workarounds. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Building a Digital Defense against Calendar Fraud

The FBI’s Portland, Oregon office has published an advisory discussing the threat of calendar fraud and providing some steps for combating it. Scammers have started sending online users calendar invites, a form of phishing. In many cases, the calendar’s default settings allow the invitation to simply appear on your account. The fraudster could be offering you a prize or an invitation to some special event. Just click on the link and you can register, or click, put in your credit card number, and you are on your way to winning the jackpot.

NSA Advisory on Managing Risk from Transport Layer Security Inspection

The National Security Agency (NSA) has released a cyber advisory that addresses managing risk from Transport Layer Security Inspection (TLSI). This short, informative document defines TLSI (a security process that allows incoming traffic to be decrypted, inspected, and re-encrypted), explains some risks and associated challenges, and discusses mitigations. CISA encourages users and administrators to review the advisory and apply the information, as appropriate.

It Only Takes One – One Extra Letter Can be the Difference Between a Legitimate Email and Losing $1 Million

The importance of scrutinizing financial-related and highly sensitive information via email cannot be overstated. In typical business email spoofing style, a scammer, as part of a multinational fraud ring, was able to defraud the CEO of an unidentified Swiss company during a real-estate transaction – an all too common trend. After two presumably legitimate communications with his attorney, the CEO received a third email with new wiring instructions for the remaining balance.

Flexera FlexNet Publisher (ICSA-19-323-01)

CISA has published an advisory on improper input validation and memory corruption vulnerabilities in Flexera FlexNet Publisher. Versions 2018 R3 and prior are affected. These vulnerabilities could allow an attacker to deny the acquisition of a valid license for legal use of the product. The memory corruption vulnerability could allow remote code execution. Flexera recommends all users using affected versions of FlexNet Publisher upgrade to Version 2018 R4 or newer as soon as possible. CISA also recommends a series of measures to mitigate the vulnerabilities.

Reminder: Malware Can Exploit Improper Configurations

The DHS Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory reminding its partners to protect yourself from unwanted – and potentially harmful – files or programs by adhering to vendor-recommended configurations for hardware and software. It notes that doing so in addition to maintaining regular patch maintenance, will help give your systems and networks the best security possible. CISA encourages users and administrators to review the following tips and guidance:

Pages

Subscribe to Cybersecurity