Tuesday , May 21 2024

infosecbulletin

CISA Releases Three Industrial Control Systems Advisories

cisa

CISA released three advisories about Industrial Control Systems (ICS) on April 30, 2024. These advisories give current security information, vulnerabilities, and exploits related to ICS. ICSA-24-121-01 Delta Electronics CNCSoft-G2 DOPSoft:  Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code. ICSA-24-016-01 SEW-EURODRIVE MOVITOOLS MotionStudio (Update A): Successful …

Read More »

CISA
GitLab account takeover bug is actively exploited in attacks

Gitlab

The U.S. federal agency CISA has included CVE-2023-7028 in its Known Exploited Vulnerabilities Catalog. This means that the vulnerability is currently being targeted by attackers. CISA has instructed federal agencies to protect their systems by May 22, giving them a deadline of three weeks. The U.S. cybersecurity agency hasn’t shared …

Read More »

Azure Logs utilizing to identify threats: Insights From Microsoft

Azure

Microsoft security experts recently conducted an exploration on how to effectively use Azure Logs to identify and counteract threat actions. Azure’s defense mechanism relies on effectively understanding and using logs to hunt for threats. Microsoft focuses on integrating best practices for log management, analysis, and incident response to stay proactive …

Read More »

Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services

hacker

Earlier this week, EPCYBER has identified a large scale network of Chinese botnet as-a-service which consists of various domains, over 20 active telegram groups and other domestic communication channels using Chinese infrastructure. It is evident that the methods and botnet developed and used by the group, successfully bypasses latest DDoS …

Read More »

CISA Launches Ransomware Vulnerability Warning Pilot for Critical Infrastructure

CISA

Organizations across all sectors and of all sizes are too frequently impacted by damaging ransomware incidents. Many of these incidents are perpetrated by ransomware threat actors using known vulnerabilities. By urgently fixing these vulnerabilities, organizations can significantly reduce their likelihood of experiencing a ransomware event. In addition, organizations should implement …

Read More »