Cyber Security News

CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors

The National Security Agency (NSA) has partnered with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and other entities to release a critical advisory.

This initiative comes in response to the exploitation of major global telecommunications providers by a threat actor affiliated with the People’s Republic of China (PRC).

The advisory is encapsulated in the Cybersecurity Information Sheet (CSI) titled “Enhanced Visibility and Hardening Guidance for Communications Infrastructure.”

This document offers comprehensive defensive strategies designed to enhance the monitoring of networks and reinforce device security.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

It targets engineers and system administrators overseeing communications infrastructure but is also relevant to organizations managing on-premises enterprise equipment.

Dave Luber, NSA Cybersecurity Director, emphasized the importance of vigilance in cybersecurity, stating, “Vigilance is key for defending against network compromise. Always have eyes on your systems and patch and address known vulnerabilities before they become targets.”

The CSI outlines several critical measures aimed at enhancing visibility into network activities. These measures include logging all configuration changes and management connections at network perimeters and setting up alerts for unforeseen activities.

Moreover, the advisory underscores the significance of adopting robust hardening practices, such as disabling unused, unauthenticated, or unencrypted protocols, securing passwords, restricting management connections and privileged accounts, and ensuring timely patching and upgrading of devices.

According to the National Security Agency report, the guidance notably focuses on strengthening Cisco operating systems, which the PRC-affiliated threat actor specifically targeted.

The document provides detailed recommendations to mitigate these vulnerabilities, reducing the risk of malicious cyber activities.

The release of this advisory marks a proactive step towards safeguarding critical infrastructure against evolving cyber threats.

Organizations are encouraged to adopt these guidelines to bolster their defenses and protect sensitive communications networks from potential security breaches.

As cyber threats continue to grow in sophistication, such collaborative efforts are crucial in maintaining the integrity and security of global telecommunications infrastructure.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

How Nation-State Actors and Organised Hackers Involving in Their Ways of Cyber Attacks

The distinction between nation-state actors and organized cybercriminals is becoming increasingly blurred. Both groups now…

1 hour ago

Washington State Filed Lawsuit Against T-Mobile Massive Data Breach

Washington State Attorney General Bob Ferguson filed a consumer protection lawsuit against T-Mobile for its…

4 hours ago

Stalwart – All-in-One Open-Source Secure Mail Server with JMAP, IMAP4, POP3, and SMTP

Stalwart is an innovative open-source mail server solution that supports JMAP, IMAP4, POP3, and SMTP,…

5 hours ago

PriveShield – Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on browsing…

5 hours ago

1000’s Of SonicWall Devices Remain Vulnerable To CVE-2024-40766

A recent investigation revealed that the Akira and Fog ransomware groups are actively exploiting the…

5 hours ago

Critical BIOS/UEFI Vulnerabilities Allow Attackers To Overwrite System Firmware

Researchers discovered critical BIOS/UEFI vulnerabilities in the Illumina iSeq 100 DNA sequencer, where the device…

5 hours ago