You are here

Cybersecurity

(TLP:CLEAR) Recorded Future’s 2024 Threat Analysis and 2025 Predictions

Summary: In 2024, two key trends defined the cybersecurity landscape: the resilience of cybercriminal networks despite law enforcement actions and the growing complexity of enterprise attack surfaces. In addition, state-sponsored threat actors, primarily linked to China and Russia, intensified their focus on critical infrastructure and leveraged generative AI to conduct influence operations to advance their geopolitical objectives. Recorded Future’s just-released threat report explores these trends and more.

(TLP:CLEAR) Forescout’s 2024 Global Threat Roundup

Summary: Forescout Technologies recently released their 2024 Threat Report which looked back at 900 million attacks observed in the threat landscape of 2024, up 114 percent from last year’s 420 million attacks. The report includes key findings related to OT/ICS infrastructure and offers strategic recommendations for improved defense in 2025 in the recommended mitigation section.

(TLP:CLEAR) WaterISAC – EPA: National Security Information Sharing Bulletin - Q1 2025

WaterISAC and EPA just published the latest quarterly edition of the National Security Information Sharing Bulletin. The Information Sharing Bulletin (ISB) is intended for water and wastewater utility owners and operators to provide information on priority security and resilience topics, including cybersecurity, physical security, and natural disasters.

(TLP:CLEAR) WaterISAC’s Traffic Light Protocol (TLP) Infromation Sharing Guidelines

Starting the week of January 27, 2025, WaterISAC is adopting the Traffic Light Protocol (TLP) information sharing guidelines for all its written products and webinars. The use of TLP aligns WaterISAC with the widely adopted international guidelines for sharing information and facilitating more frequent and effective collaboration. Several federal agencies, such as CISA and Office of the National Cyber Director (ONCD) use the TLP.

House Committee Hearing – Unconstrained Actors: Assessing Global Cyber Threats to the Homeland

During the House Committee Hearing held yesterday, four witnesses addressed the escalating threats posed by nation-state actors, particularly from the People’s Republic of China (PRC). They highlighted the increased sophistication and operational capabilities of these threat actors and noted a rise in cyber intrusions targeting U.S. critical infrastructure. Witnesses also cited recent incidents at water utilities.

Cyber Resilience – Tenable Analysis of Salt Typhoon and Exploited Vulnerabilities

Cybersecurity firm Tenable recently released an analysis of People’s Republic of China’s (PRC)-affiliated threat actor Salt Typhoon and examines the vulnerabilities and tactics employed by the group. Salt Typhoon has infiltrated at least nine U.S.-based telecommunications companies and has utilized various tactics, primarily exploiting vulnerabilities, to gain access.

Vulnerability Awareness – Joint Advisory on Ivanti Exploit Chains by Suspected Chinese Threat Actors

Yesterday, CISA and the FBI released a joint advisory that included technical details of at least two exploit chains used by threat actors to break into Ivanti Cloud Service Appliances (CSA). The advisory comes in response to active exploitation in Ivanti CSA of the following vulnerabilities:

Pages

Subscribe to Cybersecurity