CISA und FBI warnen vor Log4j u

Portal Nachrichten

Team IT Sicherheit NEWS (572 Quellen): 30.11.22 Fixes Designänderung und Störung behoben.


Nachrichtenthemen Chronologie


➠ CISA und FBI warnen vor Log4j

➦ IT Security Nachrichten ☆ it-daily.net

Log4j

Rund ein Jahr nach der Veröffentlichung der Sicherheitslücke Log4j warnen FBI und CISA, dass Betreiber ungepatchter Systeme davon ausgehen sollten, infiltriert worden zu sein.

Tags: #Cisa | #Cyberangriff | #FBI | #log4j | #Schwachstelle | #Sicherheitslücke

...

➠ Komplette Nachricht lesen


Zur Startseite

➤ Ähnliche Beiträge für 'CISA und FBI warnen vor Log4j'

AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

vom 867.88 Punkte
Original release date: September 14, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and com

AA22-110A: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

vom 786.33 Punkte
Original release date: April 20, 2022 | Last revised: May 9, 2022SummaryActions critical infrastructure organizations should implement to immediately protect against Russian state-sponsored and criminal cyber threats: • Patch all systems. Prioritize patchin

AA22-117A: 2021 Top Routinely Exploited Vulnerabilities

vom 747.28 Punkte
Original release date: April 27, 2022 | Last revised: April 28, 2022SummaryThis joint Cybersecurity Advisory (CSA) was coauthored by cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom: the Cybersecuri

AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector

vom 687.87 Punkte
Original release date: October 28, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity

AA22-131A: Protecting Against Cyber Threats to Managed Service Providers and their Customers

vom 641.01 Punkte
Original release date: May 11, 2022SummaryTactical actions for MSPs and their customers to take today: • Identify and disable accounts that are no longer in use. • Enforce MFA on MSP accounts that access the customer environment and monitor for unex

AA22-174A: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems

vom 568.39 Punkte
Original release date: June 23, 2022SummaryActions to take today: • Install fixed builds, updating all affected VMware Horizon and UAG systems to the latest versions. If updates or workarounds were not promptly applied following VMware’s release of upda

AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data

vom 563.67 Punkte
Original release date: October 30, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity

AA22-187A: North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector

vom 516.39 Punkte
Original release date: July 6, 2022SummaryThe Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provid

AA20-107A: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching

vom 511.58 Punkte
Original release date: April 16, 2020 | Last revised: June 30, 2020SummaryNote: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all re

AA22-320A: Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester

vom 508.96 Punkte
Original release date: November 16, 2022SummaryFrom mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) ac

AA22-158A: People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

vom 492.8 Punkte
Original release date: June 7, 2022 | Last revised: June 8, 2022SummaryBest Practices • Apply patches as soon as possible • Disable unnecessary ports and protocols • Replace end-of-life infrastructure • Implement a centralized patch management system This jo

AA22-257A: Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations

vom 467.52 Punkte
Original release date: September 14, 2022SummaryActions to take today to protect against ransom operations: • Keep systems and software updated and prioritize remediating known exploited vulnerabilities. • Enforce MFA. • Make offline backups of your data. This joint Cybersecurity Advisory (

Team Security Diskussion über CISA und FBI warnen vor Log4j