Feb 08, 2023Ravie LakshmananThreat Intelligence / Cyber War The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert warning of cyber attacks against state authorities in the country that deploy a legitimate remote access software named Remcos. The mass phishing campaign has been attributed to a threat actor it tracks as UAC-0050, with the agency … [Read more...] about CERT-UA Alerts Ukrainian State Authorities of Remcos Software-Fueled Cyber Attacks
Cyber
Undersea Cables and Cyber Physical Risks.
Cyber security implies protecting the confidentiality, availability and integrity of computer systems and networks. Often security researchers and security teams focus on threats to software and the risks associated with authenticating and managing users. However, computing systems are built upon a tall stack of computing resources. Each layer within the stack is exposed to … [Read more...] about Undersea Cables and Cyber Physical Risks.
See Yourself as a Mentally Stronger Cyber Professional
As we wrapped up October, we also put the final touches on a flurry of activities to celebrate Cyber Security Awareness Month. The tradition of October as National Cybersecurity Awareness Month goes back to 2004 when Congress and the White House tasked the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) to join forces to … [Read more...] about See Yourself as a Mentally Stronger Cyber Professional
Indian Energy Company Tata Power’s IT Infrastructure Hit By Cyber Attack
Tata Power Company Limited, India's largest integrated power company, on Friday confirmed it was targeted by a cyberattack. The intrusion on IT infrastructure impacted "some of its IT systems," the company said in a filing with the National Stock Exchange (NSE) of India. It further said it has taken steps to retrieve and restore the affected machines, adding it put in place … [Read more...] about Indian Energy Company Tata Power’s IT Infrastructure Hit By Cyber Attack
Cyber Insurance and the Attribution Conundrum
Written by Martin Lee and Richard Archdeacon. Lloyds of London have recently published a Market Bulletin1 addressing the wording of cyber insurance policies to exclude losses arising from: “state backed cyber-attacks that (a) significantly impair the ability of a state to function or (b) that significantly impair the security capabilities of a state.” The concern raised is that … [Read more...] about Cyber Insurance and the Attribution Conundrum
The secret is out: Why Open Security is key to preventing cyber threats
For decades, the cybersecurity industry has been shrouded in secrecy. This is partly because of the misunderstanding that cybersecurity often relies on obscurity as its primary form of defense. As the thinking goes, if adversaries don’t know about or understand the security controls that security vendors have in place, it will be easier to defend against cyberattacks.While the … [Read more...] about The secret is out: Why Open Security is key to preventing cyber threats
How the Infrastructure Investment and Jobs Act Delivers on Cyber Resiliency
Attacks and intrusions on our nation’s vital infrastructure — our electrical grid, water systems, ports and oil supply — are on the rise. For example, as reported by the Pew Charitable Trust in March 2021, hackers changed the chemical mixture of the water supply in Oldsmar, Fla., increasing by 100 times the level of sodium hydroxide (lye) in the water supply. In June 2021, … [Read more...] about How the Infrastructure Investment and Jobs Act Delivers on Cyber Resiliency
Global Snack Manufacturer Becomes Cyber Resilient While Cutting Production Costs
Companies aren’t doing business the way they used to, and the shift to hybrid work has forced many to become increasingly security resilient or cease operations. The global food market is no exception. One of our valued customers, Leng-d’Or, was faced with a challenge during the pandemic that could have interrupted its production line, but by some quick thinking, skilled … [Read more...] about Global Snack Manufacturer Becomes Cyber Resilient While Cutting Production Costs
Cyber Security WEBINAR — How to Ace Your InfoSec Board Deck
Communication is a vital skill for any leader at an organization, regardless of seniority. For security leaders, this goes double. Communicating clearly works on multiple levels. On the one hand, security leaders and CISOs must be able to communicate strategies clearly – instructions, incident response plans, and security policies. On the other, they must be able to communicate … [Read more...] about Cyber Security WEBINAR — How to Ace Your InfoSec Board Deck
Cyber Actors Bypassing Two-Factor Authentication Implementations
On March 15, 2022, a government flash bulletin was published describing how state-sponsored cyber actors were able to use the PrintNightmare vulnerability (CVE-2021-34527) in addition to bypassing Duo 2FA to compromise an unpatched Windows machine and gain administrative privileges. This scenario did not leverage or reveal a vulnerability in Duo software or infrastructure, but … [Read more...] about Cyber Actors Bypassing Two-Factor Authentication Implementations