blog post

CISA Leads the Charge: A Comprehensive Strategy to Tackle Ransomware and the Latest Cyber Threats

In today’s digital age, the challenges and threats we face are becoming increasingly complex, and with ransomware attacks on the rise, the need for a comprehensive and proactive approach has never been more urgent.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) wants to be at the forefront of this fight. They’ve recently made an essential move by announcing plans to incorporate information about ransomware groups in their catalog of known vulnerabilities. This addition is not just a footnote. It represents a seismic shift in how the U.S. views and addresses cyber threats.

Previously, this kind of critical information, which details the vulnerabilities ransomware gangs frequently exploit, was reserved for those enrolled in CISA’s Ransomware Vulnerability Warning Pilot Program (RVWP). However, with this change, every organization, big or small, will have access to this crucial intelligence, ensuring that companies are not only aware of the threats they face but are also equipped to combat them.

They may have finally figured out what the word ‘share’ means.

Sandra Radesky and risk expert Gabriel Davis of CISA have been instrumental in driving this change. Their commitment to enhancing cybersecurity is evident in the introduction of the “known to be used in ransomware campaigns” column in the KEV catalog. This move, paired with the new RVWP list, offers a robust framework for organizations to identify and rectify common misconfigurations that ransomware groups exploit.

Moreover, in the aftermath of the recent Patch Tuesday, a day when software companies release their monthly security patches, CISA didn’t miss a beat. They promptly identified and spotlighted five pressing vulnerabilities. These range from issues in popular software like Adobe Acrobat and Microsoft Skype to more intricate vulnerabilities like the one in HTTP/2, known to have facilitated record-breaking Distributed Denial of Service (DDoS) attacks.

It’s also worth diving deeper into the Cisco vulnerability that’s been causing quite a stir in the cybersecurity community. This flaw, while alarming in its potential to destabilize VPN products, requires attackers to have deep-rooted access within an organization’s infrastructure to exploit, underlining the need for multi-layered security strategies.

And then there’s the Microsoft dilemma.                       

Two of their vulnerabilities are making headlines, with the one in Skype garnering particular attention for its potential IP address exposure risk. It’s a chilling reminder that even the software we use daily, thinking they are safe, are often vulnerable.

Which can only mean we are incompetent to reach the higher levels of the ladder from where the really smart and dedicate pro’s conduct business. The problem is that the holes they create are so large and porous, we are being flooded with threat vectors long before anyone can get to and do anything about any of them.

Perhaps the most fascinating aspect, in my opinion, revolves around NTLM hashes. These encoded versions of user passwords in Windows systems are a prime target for hackers. Yet, as cybersecurity expert Nikolas Cemerikic points out, simply obtaining these hashes is just the tip of the iceberg. Attackers would still need to decipher the actual password, a task easier said than done.

By understanding the threats, recognizing the vulnerabilities, and taking the necessary precautions, we can navigate this intricate landscape, but it literally gets trickier every day. Drop the ball at any point and we’re done.

Author

Steve King

Managing Director, CyberEd

King, an experienced cybersecurity professional, has served in senior leadership roles in technology development for the past 20 years. He has founded nine startups, including Endymion Systems and seeCommerce. He has held leadership roles in marketing and product development, operating as CEO, CTO and CISO for several startups, including Netswitch Technology Management. He also served as CIO for Memorex and was the co-founder of the Cambridge Systems Group.

 

Schedule a Demo with Us!

Fill in the form and we’ll get back to you as soon as possible.

Closing The Education Gap In The Cybersecurity Industry

Our latest resources and blog posts help you stay in touch with what’s happening in the industry. Want even more updates? Sign up for our newsletter!