Skip to main content

Arizona Counter Terrorism Information Center

0
  • Home
  • About
    • Definitions
    • Operation
    • Mission and Vision Statements
    • Privacy Policy
  • Terrorism: What To Look For
  • Community Liaison Program
  • Links
  • Report Suspicious Activity
  • Security
  • PSA
Arizona Counter Terrorism Information Center Logo
Arizona Counter Terrorism Information Center
Arizona's Fusion Center
  • Home
  • About
    • Definitions
    • Operation
    • Mission and Vision Statements
    • Privacy Policy
  • Terrorism: What To Look For
  • Community Liaison Program
  • Links
  • Report Suspicious Activity
  • Security
  • PSA
  • Home
  • Cutting Through the Cybersecurity Noise

Important message regarding COVID-19 potential scams.

Submit a Tip

If this is an emergency, or a crime, please dial 911 immediately. 

 

You can play an important role in homeland security by being vigilant and watching for signs of terrorist, criminal or suspicious activity.

Submit a Tip

Cutting Through the Cybersecurity Noise

Subheadline: 
Here’s what’s important this week: September 10th, 2021
Original Release Date: 
Friday, September 10, 2021
Details: 

Take Action

  • This is your friendly reminder to sign up for this month’s Cyber Threat Brief! We have a new, revamped format, so we hope to see you on the 4th Thursday of this month!
    Sign-Up link: https://register.gotowebinar.com/register/1562816556709846030
  • People implement security in various ways. For programmers, security is through coding practices. The Hacker News created a cute article with fun descriptions about hardening the code of imbedded systems, such as your smart toaster. The article talks about why people may worry about their IoT, why coding practices for IoT is specialized, and how people can learn about finding code vulnerabilities on a practice/game platform called secure code warrior.
    Note: This analyst has not tried the game, but it looks nice.
    Reference: https://thehackernews.com/2021/09/fighting-rogue-toaster-army-why-secure.html
  • The Open Web App Security Project (OWASP) released a peer review draft for 2021’s top 10 most exploited web application security vulnerabilities! For anyone who has interest in supporting the research, you may want to have a look.
    Reference: https://owasp.org/Top10/   

Be Aware

  • The REvil’s “Happy Blog”, the ransomware operator’s blog, was taken down after they hacked Kaseya. The group and its websites have since gone dark, until recently. The Happy Blog is available again, as of September 7th, and likely means compromises involving REvil’s ransomware will start happening, again.
    Reference:
    • https://www.flashpoint-intel.com/blog/revil-is-back-on-exploit-and-trying-to-restore-its-reputation/
    • https://thehackernews.com/2021/09/russian-ransomware-group-revil-back.html
    • https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/

Arizona Cyber Trends

Please refer to the document attached.

Reminders

Report potential, suspected, and/or confirmed cyber threats to the ACTIC via:

  • https://www.azactic.gov/Tips/
  • [email protected]
  • [email protected]
  • (602) 644-5805 or (877) 2 S A V E A Z (272- 8329) 
Bulletin: 
PDF icon 2021-9-10--Cutting_Through_the_Cyber_Noise.pdf
See more: 
Read More Security Announcements
Arizona State Seal

footer-text

©2018 Arizona Department of Public Safety (DPS) All rights reserved.

Footer Nav

  • Statewide Policies
  • PRIVACY POLICY
  • Site Map
  • CONTACT
  • Website Supported by CSU