Alerts

Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are responding to a spearphishing campaign targeting government organizations, intergovernmental organizations (IGOs), and non-governmental organizations (NGOs). A sophisticated cyber threat actor […]

No Picture
Alerts

DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks

This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security Agency (CISA) and […]

No Picture
Alerts

Russian Foreign Intelligence Service (SVR) Cyber Operations: Trends and Best Practices for Network Defenders

The Federal Bureau of Investigation (FBI), Division of Homeland Security (DHS), and Cybersecurity and Infrastructure Safety Agency (CISA) assess Russian Overseas Intelligence Assistance (SVR) cyber actors—also recognised as Advanced Persistent Risk 29 (APT 29), the […]

No Picture
Alerts

Exploitation of Pulse Connect Secure Vulnerabilities

Summary The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises affecting U.S. government agencies, critical infrastructure entities, and other private sector organizations by a cyber threat actor—or actors—beginning in June 2020 or earlier […]

Alerts

TrickBot Malware | CISA

This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security Agency (CISA) and Federal […]

Alerts

Mitigate Microsoft Exchange Server Vulnerabilities

Microsoft has released out-of-band security updates to address four vulnerabilities in Exchange Server: It is possible for an attacker, once authenticated to the Exchange server, to gain access to the Active Directory environment and download […]

No Picture
Alerts

Exploitation of Accellion File Transfer Appliance

This joint advisory is the end result of a collaborative effort by the cybersecurity authorities of Australia,[1] New Zealand,[2] Singapore,[3] the United Kingdom,[4] and the United States.[5][6] These authorities are mindful of cyber actors exploiting […]

No Picture
Alerts

Compromise of U.S. Water Treatment Facility

Summary On February 5, 2021, unknown cyber actors attained unauthorized accessibility to the supervisory manage and data acquisition (SCADA) procedure at a U.S. drinking water therapy plant. The unidentified actors applied the SCADA system’s application […]