Siemens has disclosed critical bugs that affect its LOGO! programmable logic controllers. The vulnerabilities can be exploited remotely and used to launch denial-of-service attacks. Siemens stated that the flaws impact all versions of the devices, which can be compromised when an attacker modifies the device’s configuration. LOGO! devices are designed
Two vulnerabilities found by cybersecurity firm Claroty have been patched recently by Rockwell Automation. The flaws are related to Electronic Data Sheet (EDS) files and can allow for malicious actors to expand access within a target’s OT network. Earlier this week, advisories for the vulnerabilities were published by Rockwell and
A list of the top 10 routinely exploited vulnerabilities has been provided in a new joint alert distributed via the U.S. CERT website. This alert was issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader US Government to provide technical guidance for security professionals in both the public and private sectors. This document aims to draw awareness to the most common vulnerabilities being exploited by threat actors. Foreign cyber actors frequently exploit dated and publicly known software vulnerabilities, as they often require fewer attacker resources. Therefore, the public and private sectors could mitigate some foreign cyber threats to US interests through an increased effort to patch their systems in accordance with the vulnerabilities listed in the alert.
According to a joint statement released by the UK’s National Cyber Security Centre (NCSC) and the US Cybersecurity and Infrastructure Security Agency (CISA), government-backed hackers are attacking pharmaceutical companies, research organizations, and local governments in an attempt to steal valuable information about efforts to contain the COVID-19 outbreak. The joint
According to security researchers at Abnormal Security, Microsoft Teams has been hit by two separate attacks targeting as many as 50,000 users. The campaigns reportedly aim to phish Office 365 logins. The cyberattacks impersonate notifications from Microsoft Teams in order to prompt the victim to enter login credentials, which are
Yesterday, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) announced that it plans to run DoH and DoT DNS resolution servers for federal use. However, the agency recommended that other government agencies disable DoH and DoT support on employee browsers until the CISA servers are ready for
COVID-19 has forced thousands of businesses and several governments across the world to switch to mass teleworking. However, federal employees working from home are causing significant logistical problems for networks and presents risks in terms of enforcement of security standards that are mandated by law. On Wednesday, the Cybersecurity and
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) published a detailed guide on how to identify critical infrastructure during the pandemic. The publication states that functioning critical infrastructure is paramount to effectively responding to the COVID-19 outbreak for health and safety reasons. The DHS states that specific
DHS CISA has issued guidance for securing remote workers as companies execute their teleworking contingencies resulting from the social isolation requirements for COVID-19.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert to government and commercial organizations around the Maze ransomware threat which has been impacting organizations since October 2019. Included in the alert is a list of IP addresses, domain names, and file hashes that organizations can block in order to prevent successful attacks.