The following posts are useful for general awareness of current cyber threats, vulnerabilities, guidance, and other cyber-related news or updates. These resources have been curated by the WaterISAC analyst team as items of broad relevance and benefit that do not need supplemental analysis at this time.
CrowdStrike
- CrowdStrike: 'Content Validator' bug let faulty update pass checks | Bleeping Computer
- Learning from CrowdStrike’s quality assurance failures | Help Net Security
- Poll: CISOs stick with CrowdStrike, share lessons learned | SC Magazine
Critical Infrastructure Vulnerabilities, Threats & Incidents
- Siemens Patches Power Grid Product Flaw Allowing Backdoor Deployment | SecurityWeek
- The Dual Impact of AI on Power Grids: Efficiency and Vulnerability | Tripwire
- Phone Lines Down in Multiple Courts Across California After Ransomware Attack | SecurityWeek
- OTORIO report reveals significant disruption from cyber attacks, growing concerns in OT security landscape | Industrial Cyber
IT Vulnerabilities & Security Updates
- Nvidia Patches High-Severity Vulnerabilities in AI, Networking Products | SecurityWeek
- Microsoft fixes bug behind Windows 10 Connected Cache delivery issues | Bleeping Computer
- Microsoft Defender Flaw Exploited to Deliver ACR, Lumma, and Meduza Stealers | The Hacker News
IT Malware, Threats & Risks
- Malware Campaign Lures Users With Fake W2 Form | Rapid7
- QR Codes: Convenience or Cyberthreat? | Trend Micro
- How attackers evade your EDR/XDR system — and what you can do about it | CSO
- Check Point Research Reveals Q2 2024 Brand Phishing Trends: Microsoft Tops List While New Entries Signal Shifting Threat Landscape | Checkpoint
- North Korean hacking group makes waves to gain Mandiant, FBI spotlight | Cyberscoop
Cyber Resilience & General Awareness
- Crisis communication: What NOT to do | Security Intelligence
- Why NDR is Key to Cyber 'Pest Control' | Trend Micro
- New Chrome Feature Scans Password-Protected Files for Malicious Content | The Hacker News
- How CISOs enable ITDR approach through the principle of least privilege | Help Net Security