Cyber Security News

CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors

The National Security Agency (NSA) has partnered with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and other entities to release a critical advisory.

This initiative comes in response to the exploitation of major global telecommunications providers by a threat actor affiliated with the People’s Republic of China (PRC).

The advisory is encapsulated in the Cybersecurity Information Sheet (CSI) titled “Enhanced Visibility and Hardening Guidance for Communications Infrastructure.”

This document offers comprehensive defensive strategies designed to enhance the monitoring of networks and reinforce device security.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

It targets engineers and system administrators overseeing communications infrastructure but is also relevant to organizations managing on-premises enterprise equipment.

Dave Luber, NSA Cybersecurity Director, emphasized the importance of vigilance in cybersecurity, stating, “Vigilance is key for defending against network compromise. Always have eyes on your systems and patch and address known vulnerabilities before they become targets.”

The CSI outlines several critical measures aimed at enhancing visibility into network activities. These measures include logging all configuration changes and management connections at network perimeters and setting up alerts for unforeseen activities.

Moreover, the advisory underscores the significance of adopting robust hardening practices, such as disabling unused, unauthenticated, or unencrypted protocols, securing passwords, restricting management connections and privileged accounts, and ensuring timely patching and upgrading of devices.

According to the National Security Agency report, the guidance notably focuses on strengthening Cisco operating systems, which the PRC-affiliated threat actor specifically targeted.

The document provides detailed recommendations to mitigate these vulnerabilities, reducing the risk of malicious cyber activities.

The release of this advisory marks a proactive step towards safeguarding critical infrastructure against evolving cyber threats.

Organizations are encouraged to adopt these guidelines to bolster their defenses and protect sensitive communications networks from potential security breaches.

As cyber threats continue to grow in sophistication, such collaborative efforts are crucial in maintaining the integrity and security of global telecommunications infrastructure.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints a…

1 hour ago

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group, tracked…

2 hours ago

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure enterprise…

2 hours ago

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured Kubernetes…

2 hours ago

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT

A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative…

2 hours ago

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy…

2 hours ago