Introduction
As we venture deeper into the age of smart homes and interconnected devices, the cybersecurity landscape continues to grow complex and fraught with risks. The recent advisory issued by CISA (Cybersecurity and Infrastructure Security Agency) regarding critical vulnerabilities in...
The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) Catalog by adding three new vulnerabilities. This move is a response to active exploitation evidence and highlights the ongoing challenges within the cybersecurity...
Overview of the Newly Added Vulnerabilities The new entries in the catalog include: CVE-2021-20123 - This vulnerability affects the Draytek VigorConnect and is classified as a Path Traversal Vulnerability. It enables attackers to exploit paths to access sensitive data that should otherwise...
On September 5, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) issued four Industrial Control Systems (ICS) advisories that shed light on critical vulnerabilities and security risks associated with various ICS products. These advisories serve to inform users, administrators...
Original release date: December 2, 2021
Summary
This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise framework for referenced threat actor techniques and for mitigations.
This joint...
Original release date: November 17, 2021
Summary
Actions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity
• Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591.
• Implement Link Removed.
•...
Original release date: October 18, 2021
Summary
Actions You Can Take Now to Protect Against BlackMatter Ransomware
• Implement and enforce backup and restoration policies and procedures.
• Use Link Removed.
• Use Link Removed.
• Implement network segmentation and traversal monitoring.
Note...
Original release date: October 14, 2021
Summary
Immediate Actions WWS Facilities Can Take Now to Protect Against Malicious Cyber Activity
• Do not click on Link Removed.
• If you use RDP, secure and monitor it.
• Use Link Removed.
• Use Link Removed.
Note: This advisory uses the MITRE...
Original release date: September 22, 2021
Summary
Immediate Actions You Can Take Now to Protect Against Conti Ransomware
• Use Link Removed.
• Segment and segregate networks and functions.
• Update your operating system and software.
Note: This Alert uses the MITRE Adversarial Tactics...
Original release date: September 16, 2021
Summary
This Joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 8. See the ATT&CK for Enterprise for referenced threat actor tactics and for techniques.
This joint advisory is...
Original release date: August 31, 2021
Summary
Immediate Actions You Can Take Now to Protect Against Ransomware
• Make an offline backup of your data.
• Do not click on Link Removed.
• If you use RDP, secure and monitor it.
• Link Removed your OS and software.
• Use Link Removed.
• Use Link...
Original release date: July 28, 2021
Summary
This Joint Cybersecurity Advisory was coauthored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau...
Original release date: July 20, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
Note: CISA released technical information...
Original release date: July 19, 2021
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques...
Original release date: May 28, 2021
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are responding to a spearphishing campaign targeting government organizations, intergovernmental organizations (IGOs), and non-governmental...
Original release date: May 11, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
The Cybersecurity and Infrastructure Security...
access control
business resilience
cisa
critical infrastructure
cybersecurity
darkside
data backup
encryption
fbi
incident response
it security
malware
mitigations
network segmentation
phishing
prevention
ransomware
technical details
threat actor
user training
Original release date: April 20, 2021
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises affecting U.S. government agencies, critical infrastructure entities, and other private sector organizations by a cyber threat actor—or actors—beginning in June 2020...
Original release date: March 18, 2021
Summary
This Alert announces the CISA Hunt and Incident Response Program (CHIRP) tool. CHIRP is a forensics collection tool that CISA developed to help network defenders find indicators of compromise (IOCs) associated with activity detailed in the following...
Original release date: March 17, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
The Cybersecurity and Infrastructure Security Agency...
Original release date: February 24, 2021
Summary
This joint advisory is the result of a collaborative effort by the cybersecurity authorities of Australia,[Link Removed] New Zealand,[2] Singapore,[3] the United Kingdom,[4] and the United States.[Link Removed][6] These authorities are aware of...