logo
episode-header-image
Jun 2023
2m 43s

CISA Alert AA23-165A – Understanding Ran...

N2K Networks
About this episode

CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.

AA23-165A Alert, Technical Details, and Mitigations

Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.

See the Center for Internet Security (CIS) Critical Security Controls (CIS Controls) https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0 for information on strengthening an organization’s cybersecurity posture through implementing a prescriptive, prioritized, and simplified set of best.

See the CIS Community Defense Model 2.0 (CDM 2.0) for the effectiveness of the CIS Controls against the most prevalent types of attacks and how CDM 2.0 can be used to design, prioritize, implement, and improve an organization’s cybersecurity program.

See Blueprint for Ransomware Defense for a clear, actionable framework for ransomware mitigation, response, and recovery built around the CIS Controls.

No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.

U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 

To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Today
Chetan Conikee: Create narratives of your journey. [CTO] [Career Notes]
Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explain ... Show More
10m 29s
Yesterday
No honor among thieves. [Research Saturday]
John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, ... Show More
25m 3s
Oct 10
When the breachers get breached.
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in applica ... Show More
28m 50s
Recommended Episodes
Nov 2021
1798: Dr. Chase Cunningham, CSO of Ericom Software
Dr. Chase Cunningham, CSO of Ericom Software released a techno-thriller book during Cyber Awareness Month titled "C:\>_gAbrIel." This book draws on Chase’s real-world experience as a technologist and how cyber warfare, cybersecurity, and artificial intelligence (AI) can be levera ... Show More
16m 18s
Feb 2024
ZERO TRUST
In this episode of "Life of a CISO" with Dr. Eric Cole, the focus is on the importance of prioritizing foundational cybersecurity measures over chasing new technologies. Dr. Cole emphasizes the prevalence of companies getting caught up in the hype of artificial intelligence (AI) ... Show More
24m 48s
Jun 2024
Hidden Threats: The Role of the CFO in Privacy and Security | Joe Oleksak
CFOs wield significant influence in safeguarding a company’s financial data, but entrusting cybersecurity solely to their CIOs may jeopardize privacy and open the door to data breaches. As Partner at Plante Moran, Joe Oleksak advises businesses on cybersecurity, IT audit, and tec ... Show More
47m 52s
Mar 2024
2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ... Show More
36m 29s