Cover image of show CISA Cybersecurity Alerts

CISA Cybersecurity Alerts

Podcast by N2K Networks

English

News & politics

Limited Offer

2 months for 19 kr.

Then 99 kr. / monthCancel anytime.

  • 20 hours of audiobooks / month
  • Podcasts only on Podimo
  • All free podcasts
Get Started

About CISA Cybersecurity Alerts

Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.

All episodes

52 episodes
episode CISA Alert AA23-165A – Understanding Ransomware Threat Actors: LockBit. artwork

CISA Alert AA23-165A – Understanding Ransomware Threat Actors: LockBit.

CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation. AA23-165A Alert, Technical Details, and Mitigations [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a] Stopransomware.gov [https://www.cisa.gov/stopransomware] is a whole-of-government approach that gives one central location for ransomware resources and alerts. See the Center for Internet Security (CIS) Critical Security Controls (CIS Controls) [https://www.cisecurity.org/controls] https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0 [https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0] for information on strengthening an organization’s cybersecurity posture through implementing a prescriptive, prioritized, and simplified set of best. See the CIS Community Defense Model 2.0 (CDM 2.0) [https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0] for the effectiveness of the CIS Controls [https://www.cisecurity.org/controls] against the most prevalent types of attacks and how CDM 2.0 [https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0] can be used to design, prioritize, implement, and improve an organization’s cybersecurity program. See Blueprint for Ransomware Defense [https://securityandtechnology.org/wp-content/uploads/2022/08/IST-Blueprint-for-Ransomware-Defense.pdf] for a clear, actionable framework for ransomware mitigation, response, and recovery built around the CIS Controls. No-cost cyber hygiene services: Cyber Hygiene Services [https://www.cisa.gov/cyber-hygiene-services] and Ransomware Readiness Assessment [https://github.com/cisagov/cset/]. U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov [dib_defense@cyber.nsa.gov]  To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov [report@cisa.gov], or call (888) 282-0870, or report incidents to your local FBI field office. Learn more about your ad choices. Visit megaphone.fm/adchoices [https://megaphone.fm/adchoices]

15 Jun 2023 - 2 min
episode CISA Alert AA23-158A – #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability. artwork

CISA Alert AA23-158A – #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability.

FBI and CISA are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023. AA23-158A Alert, Technical Details, and Mitigations [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a] Stopransomware.gov [https://www.cisa.gov/stopransomware] is a whole-of-government approach that gives one central location for ransomware resources and alerts. Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide [https://www.cisa.gov/stopransomware/ransomware-guide]. Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant [https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft] MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community [https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023] MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response (huntress.com) [https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft] No-cost cyber hygiene services: Cyber Hygiene Services [https://www.cisa.gov/cyber-hygiene-services] and Ransomware Readiness Assessment [https://github.com/cisagov/cset/]. U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov [dib_defense@cyber.nsa.gov]  To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov [report@cisa.gov], or call (888) 282-0870, or report incidents to your local FBI field office. Learn more about your ad choices. Visit megaphone.fm/adchoices [https://megaphone.fm/adchoices]

9 Jun 2023 - 2 min
episode CISA Alert AA23-144A – People's Republic of China state-sponsored cyber actor living off the land to evade detection. artwork

CISA Alert AA23-144A – People's Republic of China state-sponsored cyber actor living off the land to evade detection.

Cybersecurity authorities are issuing this joint Cybersecurity Advisory to highlight a recent cluster of activity associated with a People’s Republic of China state-sponsored cyber actor, also known as Volt Typhoon.  AA23-144A Alert, Technical Details, and Mitigations [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a] Active Directory and domain controller hardening: Best Practices for Securing Active Directory | Microsoft Learn [https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory] CISA regional cyber threats: China Cyber Threat Overview and Advisories [https://www.cisa.gov/china] Microsoft Threat Intelligence blog: Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog [https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/] No-cost cyber hygiene services: Cyber Hygiene Services [https://www.cisa.gov/cyber-hygiene-services] and Ransomware Readiness Assessment [https://github.com/cisagov/cset/]. U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov [dib_defense@cyber.nsa.gov]  To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov [report@cisa.gov], or call (888) 282-0870, or report incidents to your local FBI field office. Learn more about your ad choices. Visit megaphone.fm/adchoices [https://megaphone.fm/adchoices]

25 May 2023 - 2 min
episode CISA Alert AA23-136A – #StopRansomware: BianLian Ransomware Group. artwork

CISA Alert AA23-136A – #StopRansomware: BianLian Ransomware Group.

FBI, CISA, and the Australian Cyber Security Centre are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023. AA23-136A Alert, Technical Details, and Mitigations [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-136a] AA23-136A.STIX_.xml [https://www.cisa.gov/sites/default/files/2023-05/aa23-136a.stix_.xml] Stopransomware.gov [https://www.stopransomware.gov/], a whole-of-government approach with one central location for U.S. ransomware resources and alerts. cyber.gov.au [https://www.cyber.gov.au/] for the Australian Government’s central location to report cyber incidents, including ransomware, and to see advice and alerts. The site also provides ransomware advisories for businesses and organizations to help mitigate cyber threats. CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide [https://www.cisa.gov/sites/default/files/2023-01/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf] for guidance on mitigating and responding to a ransomware attack No-cost cyber hygiene services: Cyber Hygiene Services [https://www.cisa.gov/cyber-hygiene-services] and Ransomware Readiness Assessment [https://github.com/cisagov/cset/]. See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses [https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf] for guidance on hardening MSP and customer infrastructure. U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov [dib_defense@cyber.nsa.gov]  To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov [report@cisa.gov], or call (888) 282-0870, or report incidents to your local FBI field office. Learn more about your ad choices. Visit megaphone.fm/adchoices [https://megaphone.fm/adchoices]

18 May 2023 - 2 min
episode CISA Alert AA23-131A – Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG. artwork

CISA Alert AA23-131A – Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG.

FBI and CISA are releasing this joint Cybersecurity Advisory in response to the active exploitation of CVE-2023-27350. This vulnerability occurs in certain versions of PaperCut NG and PaperCut MF, software applications that help organizations manage printing services, and enables an unauthenticated actor to execute malicious code remotely without credentials.  AA23-131A Alert, Technical Details, and Mitigations [https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-131a] PaperCut: URGENT | PaperCut MF/NG vulnerability bulletin (March 2023) [https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#product-status-and-next-steps] Huntress: Critical Vulnerabilities in PaperCut Print Management Software [https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software] No-cost cyber hygiene services: Cyber Hygiene Services [https://www.cisa.gov/cyber-hygiene-services] and Ransomware Readiness Assessment [https://github.com/cisagov/cset/]. See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses [https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf] for guidance on hardening MSP and customer infrastructure. U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov [dib_defense@cyber.nsa.gov]  To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov [report@cisa.gov], or call (888) 282-0870, or report incidents to your local FBI field office. Learn more about your ad choices. Visit megaphone.fm/adchoices [https://megaphone.fm/adchoices]

12 May 2023 - 2 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Choose your subscription

Limited Offer

Premium

20 hours of audiobooks

  • Podcasts only on Podimo

  • All free podcasts

  • Cancel anytime

2 months for 19 kr.
Then 99 kr. / month

Get Started

Premium Plus

Unlimited audiobooks

  • Podcasts only on Podimo

  • All free podcasts

  • Cancel anytime

Start 7 days free trial
Then 129 kr. / month

Start for free

Only on Podimo

Popular audiobooks

Get Started

2 months for 19 kr. Then 99 kr. / month. Cancel anytime.