CyberAware – March 2021 – 1 of 2

CyberAware – March 2021 – 1 of 2
Download as a PDF

Incidents/Articles of Note:

Microsoft IOC detection Tool For Exchange Server Vulnerabilities

Microsoft has released anupdated scriptthat scans Exchange log files for indicators of compromise (IOCs) associated with thevulnerabilitiesdisclosed on March 2, 2021.

View Resource

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today’s climate of Coronavirus, unemployment, disinformation and social unrest.

View Resource

What Teamwork Can Do For Application Security

Everyone working at a company has some responsibility for driving revenue and sales, employee and customer engagement, and taking security and compliance seriously. But there’s a problem with this theory for anyone who’s ever worked at a real-life company. The concept of “everyone” owning security quickly morphs into “no one” when accountability and executive-level support are absent. Factions are formed, people protect their turf and assumptions are made about who does what. When that happens, security begins to fall through the cracks.

View Resource

Data Breach Response: Preparing For The Inevitable Security Incident

For the security organization, containment is the goal in cyber incident response. Although a one-size-fits all approach does not exist, there are critical steps and dialogue that must take place to contain a data breach. Building a comprehensive plan that activates the right people and tools at the right time helps identify an attack, contain the damage, and eliminate the root cause of the incident.

View Resource

This is an open-source product. Redistribution is encouraged.


View Virginia Fusion Center Homepage

Click Here

Observe Suspicious Activity?

Report Online

Awareness through information sharing

This bulletin is the result of collaboration and cooperation from a variety of Shield programs and public safety orientated officials. Special thanks to the following partners.





VFC Shield

“Awareness ThroughInformationSharing”

NEED HELP WITH THIS EMAIL?



Download as a PDF

USEFUL LINKS

• VFC Fusion Site
• Shield Homepage
• All Products
• Report SAR
• Email Coordinator

You have received this email because has subscribed to the “CyberAware” mailing list. Should you wish to unsubscribe please click the link below.

unsubscribe.