EPA and CISA Warn Water Facilities to Secure HMI Systems Exposed Online

EPA and CISA "strongly" encourage Water and Wastewater Systems defenders to harden remote access to HMIs on their networks by implementing the mitigations in their latest advisory.

FDA Urges Blood Suppliers to Improve Cyber Defenses

Recently, the US Food and Drug Administration (FDA) issued a bulletin urging blood establishments to address vulnerabilities in their interconnected computer systems to protect against cyber incidents.

NIST Issues Updated Cyber Guides Focused On Assessments and Communication

The NIST issued two new updates to its existing literature on gauging the efficacy of organizations’ cybersecurity protocols, addressing both the selection and maintenance of a proper cybersecurity program depending on organizational needs.

NCSC Issues Security Guidance to Help Banish Malicious Adverts and Drive a Secure Advertising Ecosystem

Brands are advised by the National Cyber Security Centre (NCSC) to ensure that their digital advertising partners prioritize cybersecurity, collaboration, and transparency to reduce the risk of malvertising on their websites.

FBI Says “Remember Me” Cookies can Put Your Email at Risk

The FBI Atlanta Division warns the public about cybercriminals exploiting "Remember-Me" cookies to access email accounts illegally. These cookies store data after logging in, allowing users to stay logged in without re-entering credentials.

OWASP Beefs up GenAI Security Advice Amid Growing Deepfakes

OWASP's guidance focuses on building infrastructure for authenticating human identity in video calls, creating processes for financial transactions, and developing incident-response plans.

U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing

The U.S. government follows Traffic Light Protocol (TLP) markings voluntarily on cybersecurity information to build trust in data handling for collaboration with partners.

CISA and FBI Release Product Security Bad Practices for Public Comment

The CISA and FBI released the Product Security Bad Practices catalog to improve software security, especially in critical infrastructure. The document identifies risky software development practices and provides guidelines to mitigate these risks.

Microsoft Issues Guidance to Combat Rising Kerberoasting Attacks

Kerberoasting attacks exploit the Kerberos protocol to steal AD credentials, allowing attackers extensive access to sensitive resources. It involves attackers cracking encrypted service tickets to obtain credentials and gain unauthorized access.

ACSC and CISA Launch Critical OT Cybersecurity Guidelines

ACSC and CISA have jointly launched a new guide called Principles of Operational Technology Cybersecurity. This guide aims to assist organizations, especially those in critical infrastructure sectors, in securing their OT environments.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags