CYBERSECURITY
NEWS
Original release date: February 2, 2023CISA released six Industrial Control Systems (ICS) advisories on February 2, 2023.These advisories provides timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations:
ICSA-23-033-01 Delta Electronics DIAScreen
ICSA-23-033-02 Mitsubishi Electric GOT2000 Series and GT SoftGOT2000
ICSA-23-033-03 Baicells Nova
ICSA-23-033-04 Delta Electronics DVW-W02W2-E2
ICSA-23-033-05 Delta Electronics DX-2100-L1-CN
ICSA-22-221-01 Mitsubishi Electric Multiple Factory Automation Products (Update D)
This product is provided subject to this Notification and this Privacy & Use policy.
Original release date: February 2, 2023CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Note: To view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known CVEs that carry significant risk to the federal enterprise. BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the Catalog that meet the specified criteria.
This product is provided subject to this Notification and this Privacy & Use policy.
Original release date: February 2, 2023Cisco released security updates for vulnerabilities affecting multiple products. A remote attacker could exploit these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Cisco Security Advisories page and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Original release date: February 2, 2023Drupal released a security update to address a vulnerability affecting the Apigee Edge module for Drupal 9.x. An attacker could exploit this vulnerability to bypass access authorization or disclose sensitive information.
CISA encourages users and administrators to review Drupal’s security advisory SA-CONTRIB- 2023-005 and apply the necessary update.
This product is provided subject to this Notification and this Privacy & Use policy.
Original release date: February 1, 2023VMware released a security update that addresses a cross-site request forgery bypass vulnerability affecting VMware vRealize Operations. A malicious user could exploit this vulnerability to take control of an affected system.
CISA encourages users and administrators to review VMware Security Advisory VMSA-2023-0002 and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Original release date: January 31, 2023CISA released one Industrial Control Systems (ICS) advisory on January 31, 2023. This advisory provides timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
CISA encourages users and administrators to review the newly released ICS advisory for technical details and mitigations:
ICSA-23-31-01 Delta Electronics DOPSoft
This product is provided subject to this Notification and this Privacy & Use policy.
El Departamento de Justicia anunció el jueves la destrucción del grupo de ransomware Hive vinculado a Rusia después de una…
La operación de malware Emotet ha continuado refinando sus tácticas en un esfuerzo por volar bajo el radar, al tiempo…
Los investigadores de ciberseguridad han descubierto una nueva campaña de ataque que aprovecha un troyano de acceso remoto (RAT)…
Los investigadores advierten sobre un aumento en los intentos de explotación que arma una falla crítica de ejecución remota de…