Original release date: May 11, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
The Cybersecurity and Infrastructure Security...
access control
business resilience
cisa
critical infrastructure
cybersecurity
darkside
data backup
encryption
fbi
incident response
it security
malware
mitigations
networksegmentation
phishing
prevention
ransomware
technical details
threat actor
user training
Original release date: September 1, 2020
Summary
This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[Link Removed] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[Link Removed] It...
access control
cybersecurity
data exfiltration
data protection
firewall security
incident management
incident response
indicators of compromise
log management
malicious activity
mitigation techniques
monitoring tools
network security
networksegmentation
remote access
system administration
threat analysis
user education
user training
vulnerability assessment
Original release date: July 24, 2020
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this alert in response to recently disclosed exploits that target F5 BIG-IP devices that are vulnerable to CVE-2020-5902. F5 Networks, Inc. (F5) released a patch for CVE-2020-5902...
Original release date: February 18, 2020 | Last revised: June 30, 2020
Summary
Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor...
access control
cisa
control systems
cybersecurity
data backup
data security
emergency planning
incident response
it networks
mitigation strategies
multipoint authentication
networksegmentation
operational technology
ot networks
pipeline operations
productivity loss
ransomware
spearphishing
threat actor techniques
user training
Original release date: February 18, 2020
Summary
Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor techniques and mitigations.
CISA...
cisa
control systems
cybersecurity
data backup
data integrity
emergency response
hmi
incident response
infrastructure
it network
loss of productivity
mitigation
networksegmentation
operational technology
ot network
phishing
pipeline security
ransomware
spearphishing
threat actor
As happened recently with WannaCrypt, we again face a malicious attack in the form of ransomware, Petya. In early reports, there was a lot of conflicting information reported on the attacks, including conflation of unrelated and misleading pieces of data, so Microsoft teams mobilized to...
Original release date: September 06, 2016
Systems Affected
Network Infrastructure Devices
Overview
The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat levels place more demands on security...
Original release date: August 01, 2015
Systems Affected
Microsoft Windows Systems, Adobe Flash Player, and Linux
Overview
Between June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing...