Daily NCSC-FI news followup 2019-07-06

ACSC Releases Updated Essential Eight Maturity Model

www.us-cert.gov/ncas/current-activity/2019/07/05/acsc-releases-updated-essential-eight-maturity-model The Australian Cyber Security Centre (ACSC) has released updates to its Essential Eight Maturity Model. The model assists organizations in determining the maturity of their implementation of the Essential EightACSCs list of the top mitigation strategies to help organizations protect their systems against adversary threats. The model identifies three levels of maturity for each mitigation strategy.. link:

www.cyber.gov.au/publications/essential-eight-maturity-model

Inside Facebooks information warfare team

www.ft.com/content/70b86214-9e77-11e9-9c06-a4640c9feebb Social media giants info ops team is at frontline of its war on disinformation

What if All Your Slack Chats Were Leaked?

www.nytimes.com/2019/07/01/opinion/slack-chat-hackers-encryption.html Unless the company makes changes to its encryption and retention policies, using Slack could put your data at risk.. Slack is one of many Silicon Valley unicorns going public this year, but its the only one that has admitted it is at risk for nation-state attacks.

Beware of Fake Microsoft OneNote Audio Note Phishing Emails

www.bleepingcomputer.com/news/security/beware-of-fake-microsoft-onenote-audio-note-phishing-emails/ This campaign comes in the form of an email with the subject “New Audio Note Received” and claims that you have received a new audio message from a contact in your address book. In order to listen to the message, though, you will need to click on a link to listen to it.

You might be interested in …

Daily NCSC-FI news followup 2019-06-13

Tivi: Louhen palvelimissa tietomurto, palveluja alhaalla jo neljättä päivää Uskomattoman hidasta toimintaa www.tivi.fi/uutiset/louhen-palvelimissa-tietomurto-palveluja-alhaalla-jo-neljatta-paivaa-uskomattoman-hidasta-toimintaa/1f174864-f64a-46d7-9aab-dbdab45801c5 Suomalaisen webhotelli-yhtiö Louhen palvelut ovat kärsineet vakavista ongelmista tietomurron takia. Louhi tiedottaa verkkosivuillaan, että seitsemän webhotellipalvelinta on kärsinyt ongelmista. Niiden johdosta verkkosivut ja sähköpostipalvelut eivät ole toimineet. Tapahtuneen tietomurron johdosta palvelut tullaan siirtämään korvaaville alustoille niin pian kuin mahdollista, Louhi tiedottaa. Ransomware […]

Read More

Daily NCSC-FI news followup 2019-10-09

Exploring a Recent Magnitude Exploit Kit Sample www.fortinet.com/blog/threat-research/magnitude-exploit-kit-sample-analysis.html As Internet Explorer’s share of the browser pie continues to shrink, exploit kits frameworks hosted by malicious actors to target browser vulnerabilities, particularly for IE are much less active than before. However, some of them now target geographic regions where IE owns a more sizable part of […]

Read More

Daily NCSC-FI news followup 2019-08-13

Attackers could use this coding bug to turn BIG-IP load balancers against organizations blog.f-secure.com/command-injection-in-f5-irules/ During a routine security assessment, F-Secure Senior Security Consultant Christoffer Jerkeby discovered that an obscure coding bug could allow attackers to exploit F5 Networks popular BIG-IP load balancer. Further research found that, following a successful exploit, an adversary could turn the […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.