TunnelVision VPN Vulnerability
A VPN bypass technique dubbed TunnelVision was discovered that allows an unauthenticated user to send DHCP messages to manipulate routes to redirect VPN traffic. This vulnerability may allow a threat actor to read, disrupt, or modify network traffic expected to be protected by the VPN. If successfully exploited, the existing VPN tunnel remains intact, and …
Continue reading TunnelVision VPN VulnerabilitySat, 18 May 2024 14:50:35 +0000
Security Issues with IoT Devices
As more Internet of Things (IoT) devices become prominent in our daily lives, concerns about their security shortcomings also increase. These devices—such as smart thermostats, smart appliances, and internet-connected security cameras and systems—add a layer of convenience and ease of access to many technologies we use regularly. While they have many advantages, they also have …
Continue reading Security Issues with IoT DevicesSat, 18 May 2024 14:35:26 +0000
Proposal to Revise SP 800-135 Revision 1, “Recommendation for Existing Application-Specific Key Derivation Functions”
Proposal to Revise SP 800-135 Revision 1, “Recommendation for Existing Application-Specific Key Derivation Functions” In July 2023, NIST’s Crypto Publication Review Board initiated a review of Special Publication (SP) 800-135 Rev. 1, Recommendation for Existing Application-Specific Key Derivation Functions (2011). NIST received five public comments in response. NIST proposes to revise SP 800-135 Rev. 1 to: Submit your comments on this decision …
Continue reading Proposal to Revise SP 800-135 Revision 1, “Recommendation for Existing Application-Specific Key Derivation Functions”Sat, 18 May 2024 14:34:29 +0000
Vulnerability in Google Chrome
A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new …
Continue reading Vulnerability in Google ChromeMon, 13 May 2024 21:54:12 +0000
#StopRansomware: Black Basta
This Joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all …
Continue reading #StopRansomware: Black BastaMon, 13 May 2024 21:43:52 +0000
Cyber Criminals Phishing and SMiShing US Retail Corporations for Gift Card Fraud
The Federal Bureau of Investigation (FBI) released this Private Industry Notification (PIN) to highlight cybercriminals’ activity using phishing and Short Message Service (SMS) phishing (SMiShing) campaigns against employees at US retail corporate offices in order to create fraudulent gift cards resulting in financial loss. As of January, the FBI noted a cybercriminal group labeled STORM-0539, …
Continue reading Cyber Criminals Phishing and SMiShing US Retail Corporations for Gift Card FraudWed, 08 May 2024 14:09:15 +0000
Russian Hacktivists Target Water and Wastewater Facilities Nationally
The Cyber Army of Russia Reborn (CARR), a hacktivist group connected to the Russian government, is actively targeting Water and Wastewater facilities across the United States to break into Supervisory Control and Data Acquisition (SCADA) systems, which are commonly used to control and monitor water utilities. Numerous incidents have been reported nationally, and the frequency of these …
Continue reading Russian Hacktivists Target Water and Wastewater Facilities NationallyTue, 07 May 2024 11:21:25 +0000
Delivery Service Scams Continue to Evolve
Phishing attacks posing as popular delivery services are becoming more challenging to spot. Many of these scams begin with a text message or email , often claiming that a package cannot be delivered. They may use language, such as “final notice,” to scare users into acting immediately. These messages provide a link stating that more …
Continue reading Delivery Service Scams Continue to EvolveTue, 07 May 2024 11:20:08 +0000
NJCCIC Change Healthcare Ransomware Incident
The NJCCIC previously reported on the ransomware attack against Change Healthcare, one of the largest healthcare technology companies in the United States. This cyberattack showcases the cascading ramifications of ransomware incidents, including financial impacts and risks of paying ransom demands. Financial Impacts:The ransomware attack caused considerable impacts, including disruptions to payment processing, prescription writing, and insurance claims. UnitedHealth, …
Continue reading NJCCIC Change Healthcare Ransomware IncidentTue, 07 May 2024 11:19:24 +0000
Business Continuity with Azure’s Business Continuity Center
Hi reader of this blog here is an offer from Microsoft that might interest you. We are thrilled to announce the Azure Business Continuity Center (ABCC, replacing BCDR Center preview with a new enhanced experience), an enhanced version of Backup center. With ABCC, you can easily identify gaps in your protection estate, take action to …
Continue reading Business Continuity with Azure’s Business Continuity CenterTue, 07 May 2024 11:16:50 +0000