BLOG

TunnelVision VPN Vulnerability

A VPN bypass technique dubbed TunnelVision was discovered that allows an unauthenticated user to send DHCP messages to manipulate routes to redirect VPN traffic. This vulnerability may allow a threat actor to read, disrupt, or modify network traffic expected to be protected by the VPN. If successfully exploited, the existing VPN tunnel remains intact, and … Continue reading TunnelVision VPN Vulnerability
Sat, 18 May 2024 14:50:35 +0000

Security Issues with IoT Devices

As more Internet of Things (IoT) devices become prominent in our daily lives, concerns about their security shortcomings also increase. These devices—such as smart thermostats, smart appliances, and internet-connected security cameras and systems—add a layer of convenience and ease of access to many technologies we use regularly. While they have many advantages, they also have … Continue reading Security Issues with IoT Devices
Sat, 18 May 2024 14:35:26 +0000

Proposal to Revise SP 800-135 Revision 1, “Recommendation for Existing Application-Specific Key Derivation Functions”

Proposal to Revise SP 800-135 Revision 1, “Recommendation for Existing Application-Specific Key Derivation Functions” In July 2023, NIST’s Crypto Publication Review Board initiated a review of Special Publication (SP) 800-135 Rev. 1, Recommendation for Existing Application-Specific Key Derivation Functions (2011). NIST received five public comments in response. NIST proposes to revise SP 800-135 Rev. 1 to:   Submit your comments on this decision … Continue reading Proposal to Revise SP 800-135 Revision 1, “Recommendation for Existing Application-Specific Key Derivation Functions”
Sat, 18 May 2024 14:34:29 +0000

Vulnerability in Google Chrome

A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new … Continue reading Vulnerability in Google Chrome
Mon, 13 May 2024 21:54:12 +0000

#StopRansomware: Black Basta

This Joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all … Continue reading #StopRansomware: Black Basta
Mon, 13 May 2024 21:43:52 +0000

Cyber Criminals Phishing and SMiShing US Retail Corporations for Gift Card Fraud

The Federal Bureau of Investigation (FBI) released this Private Industry Notification (PIN) to highlight cybercriminals’ activity using phishing and Short Message Service (SMS) phishing (SMiShing) campaigns against employees at US retail corporate offices in order to create fraudulent gift cards resulting in financial loss. As of January, the FBI noted a cybercriminal group labeled STORM-0539, … Continue reading Cyber Criminals Phishing and SMiShing US Retail Corporations for Gift Card Fraud
Wed, 08 May 2024 14:09:15 +0000

Russian Hacktivists Target Water and Wastewater Facilities Nationally

The Cyber Army of Russia Reborn (CARR), a hacktivist group connected to the Russian government, is actively targeting Water and Wastewater facilities across the United States to break into Supervisory Control and Data Acquisition (SCADA) systems, which are commonly used to control and monitor water utilities. Numerous incidents have been reported nationally, and the frequency of these … Continue reading Russian Hacktivists Target Water and Wastewater Facilities Nationally
Tue, 07 May 2024 11:21:25 +0000

Delivery Service Scams Continue to Evolve

Phishing attacks posing as popular delivery services are becoming more challenging to spot. Many of these scams begin with a text message or email , often claiming that a package cannot be delivered. They may use language, such as “final notice,” to scare users into acting immediately. These messages provide a link stating that more … Continue reading Delivery Service Scams Continue to Evolve
Tue, 07 May 2024 11:20:08 +0000

NJCCIC Change Healthcare Ransomware Incident

The NJCCIC previously reported on the ransomware attack against Change Healthcare, one of the largest healthcare technology companies in the United States. This cyberattack showcases the cascading ramifications of ransomware incidents, including financial impacts and risks of paying ransom demands.  Financial Impacts:The ransomware attack caused considerable impacts, including disruptions to payment processing, prescription writing, and insurance claims. UnitedHealth, … Continue reading NJCCIC Change Healthcare Ransomware Incident
Tue, 07 May 2024 11:19:24 +0000

Business Continuity with Azure’s Business Continuity Center

Hi reader of this blog here is an offer from Microsoft that might interest you. We are thrilled to announce the Azure Business Continuity Center (ABCC, replacing BCDR Center preview with a new enhanced experience), an enhanced version of Backup center. With ABCC, you can easily identify gaps in your protection estate, take action to … Continue reading Business Continuity with Azure’s Business Continuity Center
Tue, 07 May 2024 11:16:50 +0000