You are here

Cybersecurity

Social Engineering – It’s About People and Processes

Social engineering is commonplace, convincing, and requires continuous consideration. Dr. Larry Ponemon, founder and chairman of Ponemon Institute, discusses the ever-present social engineering threats. He covers three key elements of every organization’s cybersecurity program – people, processes, and technology – and how they fit into combatting these threats.

DHS Launches New Insider Threat Mitigation Website for the Critical Infrastructure Community

In direct response to inquiries from stakeholders, DHS/NPPD launched a new website today focused on providing the critical infrastructure community with information on the principles of insider threat mitigation. The website is dedicated to assisting organizations in establishing internal capabilities to mitigate insider threats focused on a variety of topics, including ideology, workplace violence, and cybersecurity.

Delta Electronics CNCSoft and ScreenEditor (ICSA-18-219-01)

The NCCIC has released an advisory regarding multiple stack-based buffer overflows, and out-of-bounds read vulnerabilities affecting Delta Electronics CNCSoft and ScreenEditor products. CNCSoft Version 1.00.83 and prior, and the accompanying, ScreenEditor Version 1.00.54 are affected. Exploitation of both vulnerabilities cause the software to crash due to the failure to validate user input. Currently there are no known public exploits; however, this vulnerability is remotely exploitable, and could be successfully exploited by an attacker with a low skill level.

New FBI Article - Building a Digital Defense Against Facebook Scams

The FBI has released an article on building a digital defense against a fraud that uses Facebook’s texting app—Facebook Messenger. Scammers send messages that appear to be from trusted sources or trick users into clicking on malicious links or sharing personal information. Before clicking on links, users should verify the validity of the message with the sender outside of the app.

New FBI Public Service Announcement - Securing the Internet of Things

The FBI has released a new Public Service Announcement (I-080218-PSA) on the risks associated with internet-connected devices, commonly referred to as the Internet of Things (IoT). The FBI warns that cyber threat actors can use unsecured IoT devices as proxies to anonymously pursue malicious cyber activities to further perpetuate fraud and other illegal activity.

OT/ICS Asset Inventory – Passive Scanning vs. Selective Probing

While the value of asset inventory usually goes unchallenged, it is still surprising how few organizations are doing it effectively. World renowned Stuxnet and ICS cybersecurity expert, Ralph Langner discusses the importance of OT/ICS asset inventory, along with the differences between passive scanning and selective probing. Mr. Langner concisely describes what is technically meant by passive scanning, as well as its limitations, including devices and characteristics that will likely not be detected.

RASPITE Threat Group Targets U.S. Electric Utility Organizations

ICS cybersecurity firm Dragos is tracking a threat group they dub RASPITE, that is currently actively targeting U.S. electric organizations. RASPITE’s primary focus is on ICS-operating entities; however, the group has not yet demonstrated any capability to disrupt or destroy ICS-specific operations. The group’s primary tactics include strategic web compromise (a.k.a., watering hole) and Windows credential harvesting.

Pages

Subscribe to Cybersecurity