The US Cybersecurity and Infrastructure Security Agency (CISA) released an advisory this morning discussing an ongoing effort by Russian state-sponsored cyber actors regularly targeting both large and small cleared defense contractors (CDCs) with “varying levels of cybersecurity protocols and resources.” The campaign is described as initiating at least as early as January 2020 and continuing through February 2022, according to evidence available to CISA as well as the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA). The attacks utilize a number of techniques including spearphishing, credential harvesting, brute force and password spray attacks, and exploitation of known vulnerabilities. CISA emphasized the role of simple passwords, unpatched systems, and low employee cyber security awareness in its advisory.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security