No Picture
Alerts

#StopRansomware: Cuba Ransomware | CISA

Summary Actions to take today to mitigate cyber threats from ransomware: • Prioritize remediating known exploited vulnerabilities.• Train users to recognize and report phishing attempts.• Enable and enforce phishing-resistant multifactor authentication. Note: This joint Cybersecurity […]

No Picture
Alerts

#StopRansomware: Hive Ransomware | CISA

Summary Actions to Take Today to Mitigate Cyber Threats from Ransomware: • Prioritize remediating known exploited vulnerabilities.• Enable and enforce multifactor authentication with strong passwords• Close unused ports and remove any application not deemed necessary […]

No Picture
Alerts

Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester

From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident response activities, […]

No Picture
Alerts

#StopRansomware: Daixin Team | CISA

Summary Actions to take today to mitigate cyber threats from ransomware: • Install updates for operating systems, software, and firmware as soon as they are released.• Require phishing-resistant MFA for as many services as possible.• […]

No Picture
Alerts

Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization

Actions to Help Protect Against Russian State-Sponsored Malicious Cyber Activity: • Enforce multifactor authentication (MFA) on all user accounts.• Implement network segmentation to separate network segments based on role and functionality.• Update software, including operating […]

No Picture
Alerts

Control System Defense: Know the Opponent

Traditional approaches to securing OT/ICS do not adequately address current threats. Operational technology/industrial control system (OT/ICS) assets that operate, control, and monitor day-to-day critical infrastructure and industrial processes continue to be an attractive target for […]

No Picture
Alerts

Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations

Summary Actions to take today to protect against ransom operations: • Keep systems and software updated and prioritize remediating known exploited vulnerabilities.• Enforce MFA.• Make offline backups of your data. This joint Cybersecurity Advisory (CSA) […]

No Picture
Alerts

#StopRansomware: Vice Society | CISA

Summary Actions to take today to mitigate cyber threats from ransomware: • Prioritize and remediate known exploited vulnerabilities.• Train users to recognize and report phishing attempts.• Enable and enforce multifactor authentication. Note: This joint Cybersecurity Advisory […]