Infosec teams must be allowed to fail, argues Gartner

March 18, 2024 at 03:36AM Gartner analysts Mixter and Xiu argue that a zero-tolerance approach to failure in information security is unrealistic. They advocate for a focus on effective recovery from cyber attacks, rather than expecting total prevention. They recommend developing recovery plans, prioritizing investments, and addressing mental health among infosec workers. The analysts also … Read more

Boat Dealer MarineMax Hit by Cyberattack

March 14, 2024 at 12:09PM MarineMax, a leading boat and yacht retailer, experienced a cybersecurity incident prompting business continuity measures and containment efforts. Despite some disruption, the company asserted that its operations have continued without material impact. The incident, possibly a ransomware attack, is under investigation amid compliance with SEC disclosure rules. Stakeholders are awaiting … Read more

How to Identify a Cyber Adversary: What to Look For

March 14, 2024 at 10:07AM Attributing a cyber incident to a specific threat actor involves multiple factors. Based on the meeting notes, it is clear that attributing a cyber incident to a specific threat actor is a complex task with many factors involved. Full Article

Microsoft Copilot for Security Official Launch Date Announced

March 14, 2024 at 09:15AM Microsoft’s Copilot for Security, using generative AI, will be available globally starting April 1, 2024, following an invite-only program. It enhances security professionals’ capabilities by assisting in incident response, threat hunting, posture management, and intelligence collection using natural language interaction. The solution is based on OpenAI architecture with access to … Read more

Yacht Retailer MarineMax Files ‘Cyber Incident’ with SEC

March 13, 2024 at 04:59PM MarineMax disclosed a “cybersecurity incident” to the SEC, reporting a third-party’s unauthorized access to its information systems. Despite the disruption, the company stated the incident had not materially impacted its operations, with no sensitive data compromised. The investigation is ongoing, and law enforcement has been notified. The company filed a … Read more

GAO: CISA’s OT Teams Inadequately Staffed

March 12, 2024 at 06:27PM The GAO study found that some teams at CISA were inadequately staffed in providing OT products and services. While most entities had positive experiences, there were complaints about insufficient staff, such as four federal employees and five contractors for threat hunting and incident response. Staff shortages resulted in unmet requests, … Read more

CISA’s OT Attack Response Team Understaffed: GAO

March 12, 2024 at 09:51AM The US Government Accountability Office conducted a study on CISA’s operational technology (OT) cybersecurity products and found some teams were understaffed. While CISA offers various security products and guidance, the GAO report identified staffing issues impacting incident response and architecture design reviews. CISA is urged to improve workforce planning. SecurityWeek’s … Read more

Ivanti Breach Prompts CISA to Take Systems Offline

March 11, 2024 at 05:40PM CISA officials reported a breach by threat actors who exploited Ivanti product vulnerabilities in February. Suspicious activity was discovered in two systems, the Infrastructure Protection Gateway and Chemical Security Assessment Tool, prompting CISA to recommend reviewing its advisory on three Ivanti vulnerabilities. The incident also exposed the failure of Ivanti … Read more

QEMU Emulator Exploited as Tunneling Tool to Breach Company Network

March 8, 2024 at 03:45AM Threat actors are using the QEMU open-source hardware emulator for tunneling during cyber attacks, marking the first known use of QEMU for this purpose. Kaspersky researchers discovered that QEMU enables creating virtual network interfaces, allowing communication with remote servers. This tactic demonstrates the evolving strategies of threat actors to blend … Read more

Anatomy of a BlackCat Attack Through the Eyes of Incident Response

March 6, 2024 at 10:39AM Sygnia’s prompt intervention prevented a potentially devastating ransomware attack on a company’s network by disconnecting it from the internet. The attackers, BlackCat, had penetrated the system through a compromised vendor. While some data was exfiltrated, encryption was thwarted, and the victim’s decisive action and Sygnia’s expertise proved pivotal in mitigating … Read more