logo
episode-header-image
Jun 2023
2m 43s

CISA Alert AA23-165A – Understanding Ran...

N2K Networks
About this episode

CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.

AA23-165A Alert, Technical Details, and Mitigations

Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.

See the Center for Internet Security (CIS) Critical Security Controls (CIS Controls) https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0 for information on strengthening an organization’s cybersecurity posture through implementing a prescriptive, prioritized, and simplified set of best.

See the CIS Community Defense Model 2.0 (CDM 2.0) for the effectiveness of the CIS Controls against the most prevalent types of attacks and how CDM 2.0 can be used to design, prioritize, implement, and improve an organization’s cybersecurity program.

See Blueprint for Ransomware Defense for a clear, actionable framework for ransomware mitigation, response, and recovery built around the CIS Controls.

No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.

U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 

To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Yesterday
Rolling the dice on cybersecurity.
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting e ... Show More
26m 30s
Aug 25
A farmers market of stolen data.
Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masq ... Show More
22m 12s
Aug 24
Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]
Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could fin ... Show More
11m 4s
Recommended Episodes
Nov 2021
1798: Dr. Chase Cunningham, CSO of Ericom Software
Dr. Chase Cunningham, CSO of Ericom Software released a techno-thriller book during Cyber Awareness Month titled "C:\>_gAbrIel." This book draws on Chase’s real-world experience as a technologist and how cyber warfare, cybersecurity, and artificial intelligence (AI) can be levera ... Show More
16m 18s
Feb 2024
ZERO TRUST
In this episode of "Life of a CISO" with Dr. Eric Cole, the focus is on the importance of prioritizing foundational cybersecurity measures over chasing new technologies. Dr. Cole emphasizes the prevalence of companies getting caught up in the hype of artificial intelligence (AI) ... Show More
24m 48s
Jun 2024
Hidden Threats: The Role of the CFO in Privacy and Security | Joe Oleksak
CFOs wield significant influence in safeguarding a company’s financial data, but entrusting cybersecurity solely to their CIOs may jeopardize privacy and open the door to data breaches. As Partner at Plante Moran, Joe Oleksak advises businesses on cybersecurity, IT audit, and tec ... Show More
47m 52s
Mar 2024
2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ... Show More
36m 29s