Latest News Articles



--- TLP:WHITE ---

News

− NSA Issues Guidance on Securing Wireless Devices in Public Settings

NSA released the Cybersecurity Information Sheet, “Securing Wireless Devices in Public Settings” today to help National Security System (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) teleworkers identify potential threats and minimize risks to their wireless devices and data.

https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2711968/nsa-issues-guidance-on-securing-wireless-devices-in-public-settings/

− Why Are Users Ignoring Multi-Factor Authentication?

Multi-factor authentication (MFA) is universally hailed as a leapfrog security measure that drastically reduces online threats like identity theft and online fraud. Security experts routinely recommend that users implement MFA technology where available, stressing the value of additional layers of authentication to thwart malicious hackers. Still, after a decade of evangelism and multi-millions spent on innovation, overall MFA adoption remains stagnant and statistics released by Twitter tell a startling story.

https://www.securityweek.com/why-are-users-ignoring-multi-factor-authentication

− Direct Threats to EU Institutions, Bodies, and Agencies 2021 Q2 title

The Executive Summary of our 2021 Q2 Threat Landscape Report is out.

https://media.cert.europa.eu/static/MEMO/2021/TLP-WHITE-2021Q2-Threat_Landscape_Report-Executive-Summary-v1.0.pdf

Vulnerabilities

− Leading cybersecurity agencies reveal list of most exploited vulnerabilities of the past 2 years

The leading cybersecurity and law enforcement agencies from the United States, the United Kingdom, and Australia have issued a joint cybersecurity advisory focusing on the top 30 vulnerabilities that were commonly abused by threat actors over the course of 2020 and 2021.

https://www.welivesecurity.com/2021/07/29/most-exploited-vulnerabilities-report/
https://us-cert.cisa.gov/ncas/alerts/aa21-209a

− Critical Vulnerability In Hyper-V Allowed Attackers To Exploit Azure

Guardicore Labs, in collaboration with SafeBreach Labs, found a critical vulnerability in Hyper-V’s virtual network switch driver (vmswitch.sys).

https://www.guardicore.com/labs/critical-vulnerability-in-hyper-v-allowed-attackers-to-exploit-azure/
https://media.cert.europa.eu/static/SecurityAdvisories/2021/CERT-EU-SA2021-042.pdf

Community News

− UNHACKED: 121 TOOLS AGAINST RANSOMWARE ON A SINGLE WEBSITE

The decryptors available in the No More Ransom repository have helped more than six million people to recover their files for free. This prevented criminals from earning almost a billion euros through ransomware attacks. Currently offering 121 free tools able to decrypt 151 ransomware families, it unites 170 partners from the public and private sector. The portal is available in 37 languages.

https://www.europol.europa.eu/newsroom/news/unhacked-121-tools-against-ransomware-single-website

--- TLP:WHITE ---