Saturday, January 16, 2021
Primarius Group
No Result
View All Result
PG-Intel
Advertisement
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management
PG-Intel
No Result
View All Result

CISA Warns of Cloud Attacks Targeting Poor Cyber Hygiene

2 days ago
in Information Security/Cyber security
0
CISA Warns of Cloud Attacks Targeting Poor Cyber Hygiene
Share on FacebookShare on TwitterShare on LinkedIn


A US cybersecurity company is urging organizations to enhance their cyber-hygiene after warning of a number of profitable assaults focusing on cloud providers utilized by distant employees.

The Cybersecurity and Infrastructure Safety Company (CISA) revealed in a report yesterday that attackers are more and more focusing on company and private laptops with phishing, brute pressure login makes an attempt and presumably a “pass-the-cookie” assault to entry cloud accounts.

Though these assaults weren’t tied again to a single menace actor, they shared lots of the identical ways.

Some attackers spoofed file internet hosting providers and different legit distributors in phishing emails to reap log-ins, earlier than utilizing these hijacked accounts to phish others within the group.

In some assaults, account hijackers modified forwarding and key phrase search guidelines. That is usually accomplished by BEC attackers seeking to monitor e mail conversations with suppliers, and to cover phishing warnings.

In a single instance, a VPN server was configured with port 80 open for distant employee entry, so cyber-criminals focused it with brute pressure log-in makes an attempt.

Though multi-factor authentication (MFA) thwarted some makes an attempt to brute pressure accounts, in a single case menace actors are believed to have used browser cookies to defeat MFA with a “pass-the-cookie” attack.

CISA was at pains to level out that none of this exercise is said to the latest SolarWinds provide chain assault believed to have been carried out by subtle Russian state actors.

Nonetheless, these assaults have actually turn out to be widespread sufficient to warrant intervention by the company.

It provided a long list of recommendations for organizations to enhance their cyber-hygiene and strengthen cloud safety practices.

Alongside conditional entry (CA) insurance policies, MFA, restrictions on e mail forwarding, consumer coaching, safe privileged entry and 0 belief, CISA argued that distant workers mustn’t use private gadgets for work. On the very least, cellular system administration instruments ought to be used to mitigate danger, it mentioned.

ShareTweetShare

Related Posts

Florida Man Cyberstalked Survivor of Murder Attempt
Information Security/Cyber security

Florida Man Cyberstalked Survivor of Murder Attempt

January 15, 2021
Google exposes malicious exploits targeting Windows and Android users
Information Security/Cyber security

Why cybersecurity audits are essential for risk management

January 15, 2021
Women in Cybersecurity Mid-Atlantic Partners with CMMC COE
Information Security/Cyber security

Women in Cybersecurity Mid-Atlantic Partners with CMMC COE

January 15, 2021
Creating a Zero Trust Foundation
Information Security/Cyber security

Creating a Zero Trust Foundation

January 15, 2021
How to check if someone else accessed your Google account
Information Security/Cyber security

How to check if someone else accessed your Google account

January 15, 2021
UK Accidentally Deletes 150k Arrest Records
Information Security/Cyber security

UK Accidentally Deletes 150k Arrest Records

January 15, 2021
Next Post
Exclusive: Whistleblowers and cybersecurity | ISJ International Security Journal

Exclusive: Whistleblowers and cybersecurity | ISJ International Security Journal

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Updates

Hacker Blows Chance at Early Release By Hacking More

Hacker Blows Chance at Early Release By Hacking More

9 mins ago
French forces get new batch of micro-drones for recon missions

French forces get new batch of micro-drones for recon missions

31 mins ago
Joker’s Stash Reportedly Shutting Down Operations

Joker’s Stash Reportedly Shutting Down Operations

57 mins ago
Theodore Roosevelt Carrier Strike Group Conducts Bilateral Exercise with JMSDF

Theodore Roosevelt Carrier Strike Group Conducts Bilateral Exercise with JMSDF

2 hours ago
Doval’s Playground | Pak Media

Was Indian NSA Kabul Visit Meant To Undermine Peace? Pak Media

2 hours ago
IAF says Astra officially inducted, Next in Mirage-2000, Tejas and MiG-29 fleet – Indian Defence Research Wing

IAF says Astra officially inducted, Next in Mirage-2000, Tejas and MiG-29 fleet – Indian Defence Research Wing

3 hours ago
The Boogaloo Bois Prepare for Civil War

The Boogaloo Bois Prepare for Civil War

3 hours ago
Russia follows US to withdraw from Open Skies Treaty

Russia follows US to withdraw from Open Skies Treaty

4 hours ago
Load More
PG-Intel

© 2020 All Rights Reserved .

Brought to you by Primarius Group

  • Disclaimer
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Physical Security
  • Cyber security
  • Defense
  • Corporate Security
  • Emergency Management
  • Open Source Intelligence
  • More
    • Geo-politics
    • Threat intelligence
    • Protective Intelligence
    • Risk Management

© 2020 All Rights Reserved .