Latest Cybersecurity News 2021-08-24 Edition

Cyber News Banner 2021-08-24 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Incident Response for DDoS DDoS attacks are unique cyber threats, and require a focused approach to successfully manage and mitigate. The Canadian Centre for Cyber Security (CCCS) suggests a four-step approach of identify, contain, recover, and review. See their DDoS post for more […]

Latest Cybersecurity News 2021-08-16 Edition

Cyber News Banner 2021-08-16 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Disable Unused Services Many Windows-based cyber attacks exploit flaws in services running on a server or workstation computer. While patching is always recommended, it’s even safer to disable unused services on your systems. Aside from improving performance, having fewer services can reduce your […]

Latest Cybersecurity News 2021-08-09 Edition

Cyber News Banner 2021-08-09 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Ethical Hacking Ethical hacking should be a part of every company’s cybersecurity program. We all do our best to secure our networks and data, but having a trusted independent expert attempt to breach those defenses in a controlled fashion can help identify unknown vulnerabilities – before […]

Latest Cybersecurity News 2021-08-03 Edition

Cyber News Banner 2021-08-03 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Stay current on alerts and advisories Consider subscribing to services that offer current information about the latest vulnerabilities and how to manage them. Threat intelligence feed services provide insights about emerging patterns of attack seen in the wild; the Canadian Centre for Cyber […]

Latest Cybersecurity News 2021-07-26 Edition

Cyber News Banner 2021-07-26 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Do you have support? Regular patching is important, but no hardware or software lasts forever. In your digital asset inventory, track the “end of support” and “end of life” milestones for all components in your networks so you can budget and plan to […]

Latest Cybersecurity News 2021-07-20 Edition

Composite image of spy in black hoodie

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Update your browser It’s easy to check if you are running the latest version of a web browser on your computer. Most popular applications put the update and version information in the “About” section of the browser. For example, if you use Chrome, […]

Latest Cybersecurity News 2021-07-12 Edition

ISA Cybersecurity Cyber News July 12

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Where do you keep your incident response plan? Be sure to store a secure copy of your incident response plan separate from your infrastructure. In the event that you are faced with a cyberattack that encrypts your data or otherwise makes your systems unavailable, you will want to have access to […]

Lessons Learned From The Colonial Pipeline Cyber Attack

lessons learned from the colonial pipeline cyber attacks

It has been less than two months since a DarkSide ransomware attack on Colonial Pipeline caused a significant disruption to key infrastructure in the United States. Here are five lessons that oil & gas – and other energy concerns – can take from the incident:  Lesson 1: The importance of system monitoring The hackers launched their attack in the early hours of May 7, exfiltrating some 100GB of […]

Colossal Kaseya ransomware attack affecting companies around the world

person types on a computer keyboard

On July 2, threat actors launched a cyber attack against users of IT management software company Kaseya’s “VSA” remote monitoring and management application. The hackers compromised the VSA application and used it as a springboard to deploy REvil/Sodinokibi ransomware on some VSA users.  One security researcher has characterized the incident as a “colossal and devastating supply chain attack”. According to the Washington Post, “because […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.