Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 3
58 résultats taggé CISA  ✕
Multiple attacks forces CISA to order agencies to upgrade or remove end-of-life Ivanti appliance https://therecord.media/cisa-urges-federal-agencies-remove-ivanti-product
16/09/2024 15:48:50
QRCode
archive.org
thumbnail

The nation’s top cyber watchdogs urged federal agencies to either remove or upgrade an Ivanti appliance that is no longer being updated and has been exploited in attacks.

therecord.media EN 2024 CISA Ivanti remove appliances End-of-Life
Russian Military Cyber Actors Target US and Global Critical Infrastructure https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
05/09/2024 21:44:51
QRCode
archive.org

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA) assess that cyber actors affiliated with the Russian General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155) are responsible for computer network operations against global targets for the purposes of espionage, sabotage, and reputational harm since at least 2020. GRU Unit 29155 cyber actors began deploying the destructive WhisperGate malware against multiple Ukrainian victim organizations as early as January 13, 2022. These cyber actors are separate from other known and more established GRU-affiliated cyber groups, such as Unit 26165 and Unit 74455.

cisa EN 2024 FBI CISA GRU Global Critical Infrastructure Unit29155 GRU-affiliated
White House working on cyber insurance policy proposal for ‘catastrophic’ incidents https://therecord.media/white-house-cyber-insurance-catastrophic?ref=news.risky.biz
15/08/2024 09:53:45
QRCode
archive.org
thumbnail

At the Black Hat cybersecurity conference on Thursday, National Cyber Director Harry Coker, Jr. said his office is working with the Department of Treasury’s federal insurance office as well as officials at the Cybersecurity and Infrastructure Security Agency (CISA) on the effort.

therecord.media EN 2024 cyber-insurance policy proposal US CISA
Chinese APT40 hackers hijack SOHO routers to launch attacks https://www.bleepingcomputer.com/news/security/chinese-apt40-hackers-hijack-soho-routers-to-launch-attacks/
10/07/2024 17:40:13
QRCode
archive.org
thumbnail

An advisory by CISA and multiple international cybersecurity agencies highlights the tactics, techniques, and procedures (TTPs) of APT40 (aka

bleepingcomputer 2024 EN APT40 Australia China CISA Router Security-Advisory SOHO-Router
CISA confirms hackers may have accessed data from chemical facilities during January incident https://therecord.media/cisa-confirms-hackers-chemical-facilities
25/06/2024 09:03:06
QRCode
archive.org
thumbnail

The agency found no evidence that hackers exfiltrated information but noted the intrusion “may have resulted in the potential unauthorized access” to security plans, vulnerability assessments and user accounts within a national system to protect the chemicals sector.

therecord.media EN 2024 CISA confirms hackers CSAT Critical-infrastructure
CISA: Email from federal agencies possibly accessed in Russian breach of Microsoft https://therecord.media/cisa-microsoft-breach-emergency-directive
15/04/2024 16:35:25
QRCode
archive.org
thumbnail

CISA publicly released an emergency directive issued to federal agencies earlier this month, detailing how a breach at Microsoft could have affected the government.

therecord EN 2024 CISA Microsoft Breach government email
Why CISA is Warning CISOs About a Breach at Sisense https://krebsonsecurity.com/2024/04/why-cisa-is-warning-cisos-about-a-breach-at-sisense/
12/04/2024 21:27:44
QRCode
archive.org

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach at business intelligence company Sisense, whose products are designed to allow companies to view the status of multiple third-party online services in a single dashboard.…

krebsonsecurity EN 2024 CISA Sisense data-breach
Understanding and Responding to Distributed Denial-Of-Service Attacks https://www.cisa.gov/resources-tools/resources/understanding-and-responding-distributed-denial-service-attacks
21/03/2024 15:20:36
QRCode
archive.org

This joint guide, Understanding and Responding to Distributed Denial-Of-Service Attacks, addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques:

  • Volumetric, attacks aiming to consume available bandwidth.

  • Protocol, attacks which exploit vulnerabilities in network protocols.

  • Application, attacks targeting vulnerabilities in specific applications or running services.

CISA EN 2024 DDoS guidance US Denial-Of-Service Attacks
CISA forced to take two systems offline last month after Ivanti compromise https://therecord.media/cisa-takes-two-systems-offline-following-ivanti-compromise
08/03/2024 20:07:38
QRCode
archive.org
thumbnail

Hackers breached the systems of the Cybersecurity and Infrastructure Security Agency (CISA) in February through vulnerabilities in Ivanti products, officials said.

therecord.media EN 2024 CISA Ivanti Gateway comprimised offline CVE-2023-46805 CVE-2024-21887 CVE-2024-21893
CISA, FBI, and MS-ISAC Release Advisory on Phobos Ransomware https://www.cisa.gov/news-events/alerts/2024/02/29/cisa-fbi-and-ms-isac-release-advisory-phobos-ransomware
06/03/2024 10:16:10
QRCode
archive.org

Today, CISA, the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) released a joint Cybersecurity Advisory (CSA), #StopRansomware: Phobos Ransomware, to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs), which are from incident response investigations tied to Phobos ransomware activity from as recently as February, 2024.

cisa EN 2024 Phobos Ransomware Critical-infrastructure StopRansomware:
Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure https://thehackernews.com/2024/03/phobos-ransomware-aggressively.html
06/03/2024 10:15:25
QRCode
archive.org

U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities, outlining the various tactics and techniques the threat actors have adopted to deploy the file-encrypting malware.

"Structured as a ransomware-as-a-service (RaaS) model, Phobos ransomware actors have targeted entities including municipal and county governments, emergency services, education, public healthcare, and critical infrastructure to successfully ransom several million in U.S. dollars," the government said.

thehackernews EN 2024 Phobos Ransomware CISA US Critical-infrastructure
ALPHV/BlackCat hits healthcare after retaliation threat, FBI says https://www.scmagazine.com/news/alphv-blackcat-hits-healthcare-after-retaliation-threat-fbi-says?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
04/03/2024 12:35:41
QRCode
archive.org
thumbnail

The gang claimed responsibility for a high-profile attack against Change Healthcare Wednesday.

scmagazine EN 2024 CISA ALPHV BlackCat FBI CISA Healthcare
CISA cautions against using hacked Ivanti VPN gateways even after factory resets https://www.bleepingcomputer.com/news/security/cisa-cautions-against-using-hacked-ivanti-vpn-gateways-even-after-factory-resets/
01/03/2024 09:44:05
QRCode
archive.org
thumbnail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed today that attackers who hack Ivanti VPN appliances using one of multiple actively exploited vulnerabilities may be able to maintain root persistence even after performing factory resets.

bleepingcomputer EN 2024 CISA FBI Ivanti Warning
Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Connect and Policy Secure Gateways | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b
29/02/2024 19:44:12
QRCode
archive.org

Based upon the authoring organizations’ observations during incident response activities and available industry reporting, as supplemented by CISA’s research findings, the authoring organizations recommend that the safest course of action for network defenders is to assume a sophisticated threat actor may deploy rootkit level persistence on a device that has been reset and lay dormant for an arbitrary amount of time. For example, as outlined in PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure), sophisticated actors may remain silent on compromised networks for long periods. The authoring organizations strongly urge all organizations to consider the significant risk of adversary access to, and persistence on, Ivanti Connect Secure and Ivanti Policy Secure gateways when determining whether to continue operating these devices in an enterprise environment.

CISA EN 2024 Ivanti Vulnerabilities Connect persistence Warning
Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-046a
16/02/2024 09:29:11
QRCode
archive.org

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) conducted an incident response assessment of a state government organization’s network environment after documents containing host and user information, including metadata, were posted on a dark web brokerage site. Analysis confirmed that an unidentified threat actor compromised network administrator credentials through the account of a former employee—a technique commonly leveraged by threat actors—to successfully authenticate to an internal virtual private network (VPN) access point, further navigate the victim’s on-premises environment, and execute various lightweight directory access protocol (LDAP) queries against a domain controller.[1] Analysis also focused on the victim’s Azure environment, which hosts sensitive systems and data, as well as the compromised on-premises environment. Analysis determined there were no indications the threat actor further compromised the organization by moving laterally from the on-premises environment to the Azure environment.

CISA EN 2024 Compromised Account Former-Employee advisory
Technology News Government News Get more insights with the Recorded Future Intelligence Cloud. Learn more. In alerting about two Citrix bugs, CISA recommends immediate attention for one https://therecord.media/cisa-citrix-bugs-immediate-attention-for-one
22/01/2024 10:49:55
QRCode
archive.org
thumbnail

Two bugs in Citrix technology are drawing serious attention this week from the Cybersecurity and Infrastructure Security Agency.

CISA says federal agencies much patch one of the vulnerabilities — tagged as CVE-2023-6548 — by January 24. It’s one of the rare times the cyber agency has put a remediation date of less than three weeks on a vulnerability.

CISA did not respond to requests for comment about why the remediation timeline was shorter than most.

The other bug — listed as CVE-2023-6548 — must be fixed by February 7. CISA’s alerts are aimed at federal agencies but often serve as general warnings for the public.

therecord EN 2024 Citrix CVE-2023-6548 CISA
Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability https://www.redpacketsecurity.com/act-now-cisa-flags-active-exploitation-of-microsoft-sharepoint-vulnerability/
12/01/2024 10:22:53
QRCode
archive.org
thumbnail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server to its

redpacketsecurity EN 2024 CISA Microsoft SharePoint CVE-2023-29357
Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-341a
08/12/2023 08:01:26
QRCode
archive.org

The Russia-based actor Star Blizzard (formerly known as SEABORGIUM, also known as Callisto Group/TA446/COLDRIVER/TAG-53/BlueCharlie) continues to successfully use spear-phishing attacks against targeted organizations and individuals in the UK, and other geographical areas of interest, for information-gathering activity.

The UK National Cyber Security Centre (NCSC), the US Cybersecurity and Infrastructure Security Agency (CISA), the US Federal Bureau of Investigation (FBI), the US National Security Agency (NSA), the US Cyber National Mission Force (CNMF), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and the New Zealand National Cyber Security Centre (NCSC-NZ) assess that Star Blizzard is almost certainly subordinate to the Russian Federal Security Service (FSB) Centre 18.

cisa EN 2023 US Russia FSB Star-Blizzard SEABORGIUM spear-phishing attacks UK
IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a
04/12/2023 18:10:49
QRCode
archive.org

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Environmental Protection Agency (EPA), and the Israel National Cyber Directorate (INCD)—hereafter referred to as "the authoring agencies"—are disseminating this joint Cybersecurity Advisory (CSA) to highlight continued malicious cyber activity against operational technology devices by Iranian Government Islamic Revolutionary Guard Corps (IRGC)-affiliated Advanced Persistent Threat (APT) cyber actors.

cisa US EN 2023 FBI IRGC Iran PLC CyberAv3ngers Advisory Critical-infrastructure
MAR-10478915-1.v1 Citrix Bleed https://www.cisa.gov/news-events/analysis-reports/ar23-325a
21/11/2023 20:32:29
QRCode
archive.org

This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR--Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

cisa EN 2023 CitrixBleed analysis IoCs
page 2 / 3
4638 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio