Aggregator
.NET 一款红队执行命令回显的白名单工具
39套.NET系统漏洞威胁情报(10.02更新)
ConnectSecure unveils M365 Assessment Module to help MSPs identify security weaknesses
ConnectSecure launched its new Microsoft 365 (M365) Assessment module. The solution empowers MSPs with greater visibility into Microsoft 365 configurations, offering real-time monitoring of changes and improving security controls. As the most widely used productivity suite by millions of companies globally, Microsoft 365 provides powerful, cloud-based tools that enhance workplace efficiency across devices. However, due to human errors, configuration missteps, or lax security practices, the platform often becomes a target for cybercriminals—not due to inherent … More →
The post ConnectSecure unveils M365 Assessment Module to help MSPs identify security weaknesses appeared first on Help Net Security.
CVE-2024-30132 | HCL Nomad Server on Domino 1.0.12 HTTP Security Header information disclosure (KB0116298)
CheekAge: когда ДНК щеки предсказывает будущее
GSM-коллапс: ураган «Хелен» повредил 370 вышек сотовой связи
Five Eyes Agencies Put Focus on Active Directory Threats
The U.S. and its Five Eyes alliance partners are warning enterprises techniques threat actors use to target Microsoft's Active Directory and ways that they can detect and mitigate such attacks.
The post Five Eyes Agencies Put Focus on Active Directory Threats appeared first on Security Boulevard.
How Overreliance on EDR Is Failing Healthcare Providers
Healthcare organizations have faced 21% of all cyberattacks since 2023, as cybercriminals use stolen data and operational disruptions to pressure providers into paying a ransom. Experts advise healthcare firms to move beyond EDR tools and adopt a holistic security strategy.
Texas Hospital Diverting Ambulances in Wake of Attack
University Medical Center, a Lubbock, Texas-based public health system that includes a level-one trauma center and a children's hospital, is diverting ambulances and working to restore an IT outage affecting some patient services in the wake of a ransomware attack late last week.
Logpoint Strengthens SIEM by Acquiring Muninn AI-Powered NDR
Logpoint acquires Muninn to integrate its AI-based NDR technology, enhancing threat detection and response capabilities in its SIEM platform. This move supports Logpoint's mission to defend OT and ICS systems against ransomware attacks by combining visibility from networks and applications.
White House Pledges Major Deliverables at Ransomware Summit
The International Counter Ransomware Initiative is kicking off a four-day summit Monday in Washington that aims to coordinate the group’s 68 member nations around a series of global efforts designed to enhance information sharing and develop strategies to deter ransomware attacks.
Dragos Boosts OT Defense with Network Perception Acquisition
Dragos' acquisition of Network Perception will enrich its real-time network monitoring with robust visualization and configuration analysis tools. This transaction aims to bolster the security of operational technology networks and support customers in building more defensible architectures.
ASD’s ACSC, CISA, FBI, NSA, and International Partners Release Guidance on Principles of OT Cybersecurity for Critical Infrastructure Organizations
Today, the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)—in partnership with CISA, U.S. government and international partners—released the guide Principles of Operational Technology Cybersecurity. This guidance provides critical information on how to create and maintain a safe, secure operational technology (OT) environment.
The six principles outlined in this guide are intended to aid organizations in identifying how business decisions may adversely impact the cybersecurity of OT and the specific risks associated with those decisions. Filtering decisions that impact the security of OT will enhance the comprehensive decision-making that promotes security and business continuity.
CISA encourages critical infrastructure organizations review the best practices and implement recommended actions which can help ensure the proper cybersecurity controls are in place to reduce residual risk in OT decisions.
For more information on OT cybersecurity, review our Industrial Control Systems page and the Joint Cybersecurity Advisory Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems to help critical infrastructure organizations manage and enhance their OT cybersecurity.
Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on October 1, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-275-01 Optigo Networks ONS-S8 Spectra Aggregation Switch
- ICSA-24-275-02 Mitsubishi Electric MELSEC iQ-F FX5-OPC
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.