On May 21, 2018, new variants of the side-channel central processing unit (CPU) hardware vulnerabilities known as Spectre and Meltdown were publicly disclosed. These variants—known as 3A and 4—can allow …
US-Cert Alerts
-
In a traditional brute-force attack, a malicious actor attempts to gain unauthorized access to a single account by guessing the password. This can quickly result in a targeted account getting …
-
BrowserPasswordSpamUS-CertWindows
Emotet Malware – one of the most destructive malware right now
by blackMOREby blackMOREEmotet continues to be among the most costly and destructive malware affecting SLTT governments. Its worm-like features result in rapidly spreading network-wide infection, which are difficult to combat. Emotet infections …
-
MonitoringNetwork TrafficPasswordSecuritySpamUS-CertWindows
Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
by blackMOREby blackMORERecommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent …
-
MonitoringNetwork TrafficPasswordScanningSecuritySoundUS-CertVirtual Private Network (VPN)
Advanced Persistent Threat Activity Exploiting Managed Service Providers
by blackMOREby blackMOREOrganizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s …