با برنامه Player FM !
67 - CISA vs. Snake Oil
Manage episode 328928345 series 2943439
Or at least that's my analysis of CISA Alert AA22-137A
It doesn't matter what fancy tools you have if you're using and configuring them incorrectly.
This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI
In this episode I'm going to review CISA Alert (AA22-137A)
https://www.cisa.gov/uscert/ncas/alerts/aa22-137a
Weak Security Controls and Practices Routinely Exploited for Initial Access
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8]
Download the PDF version of this report (pdf, 430kb).
--- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support87 قسمت
Manage episode 328928345 series 2943439
Or at least that's my analysis of CISA Alert AA22-137A
It doesn't matter what fancy tools you have if you're using and configuring them incorrectly.
This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI
In this episode I'm going to review CISA Alert (AA22-137A)
https://www.cisa.gov/uscert/ncas/alerts/aa22-137a
Weak Security Controls and Practices Routinely Exploited for Initial Access
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8]
Download the PDF version of this report (pdf, 430kb).
--- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support87 قسمت
همه قسمت ها
×به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.