Microsoft Security Virtual Training Day: Defend Against Threats and Secure Cloud Environments

Grow your skills at Security Virtual Training Day: Defend Against Threats and Secure Cloud Environments from Microsoft Learn. At this free event, you’ll learn to perform advanced hunting, detections, and investigations, and remediate security alerts with Microsoft Defender and Microsoft Sentinel. Using automated extended detection and response (XDR) in Microsoft Defender and unified cloud-native security information and event management (SIEM) through Microsoft Sentinel, you’ll learn to confidently perform investigations and remediations to help defend against threats. You will have the opportunity to: Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. Use Microsoft Defender for Cloud to perform cloud security posture management and to help protect cloud workloads. Understand ways to help protect people and data against cyberthreats with Microsoft technologies. Join us at an upcoming two-part event:
November 16, 2023 | 12:00 PM – 2:45 PM | (GMT-05:00) Eastern Time (US & Canada)
November 17, 2023 | 12:00 PM – 2:00 PM | (GMT-05:00) Eastern Time (US & Canada)

Delivery Language: English
Closed Captioning Language(s): English
 
REGISTER TODAY >

Register Now! NIST Personal Identity Verification Webinar

Register for our NIST Webinar! Learn about Revisions to Two of our Identity Special Publications

Event Date: November 8, 2023

Time: 1:00 PM-2:30 PM ET

Description:

The National Institute of Standards and Technology (NIST) will be hosting a webinar to introduce two recently published Public Draft Special Publications (SPs):  The 3-part Drafts of SP 800-73 Revision 5, Interfaces for Personal Identity Verification (PIV) and Draft SP 800-78 Revision 5, Cryptographic Algorithms and Key Sizes for Personal Identity Verification. These publications are complements to FIPS 201-3, which defines the requirements and characteristics of government-wide interoperable identity credentials used by federal employees and contractors.

The workshop will discuss the necessary changes made to the PIV card, its credentials, and cryptographic capability to align with FIPS 201-3. 

Full Agenda:

1:00 PM-1:05 PM – Introduction and Welcome

1:05 PM-1:15 PM – Introduction to the PIV Standard

1:15 PM-1:45 PM – Changes to Draft SP 800-73 Revision 5

1:45 PM-2:15 PM – Changes to Draft SP 800-78 Revision 5

2:15 PM-2:30 PM – Key Dates/Next Steps/Closing

Visit the event page to register and learn more about the workshop. If you have any questions, please reach out to our team at [email protected].

Register Now

NIST NCCoE’s IoT Onboarding Webinar

The National Cybersecurity Center of Excellence (NCCoE) is hosting a virtual event open to the public! Join the NCCoE Internet of Things (IoT) Onboarding team as we explore a process known as trusted network-layer onboarding, which in combination with additional device security capabilities could improve the security of networks and IoT devices.  

During this webinar, attendees will: 

  • Meet the NCCoE IoT Onboarding team and their industry collaborators
  • Learn about Draft NIST SP 1800-36, Vols. A-E, Trusted IoT Device Network-Layer Onboarding and Lifecycle Management, and how it can be used to help organizations protect both their IoT devices and their networks 
  • Hear from the project’s collaborators about example technology solutions using Wi-Fi Easy Connect, BRSKI, and Thread 
  • Engage in a Q&A period with the project team and industry experts 
  • Gain resources and additional information to help contribute to this project  

Speakers

  • Cherilyn Pascoe, Director, NIST NCCoE 
  • Paul Watrobski, Principal Investigator, NIST NCCoE  
  • Susan Symington, Cyber Architecture and Resiliency Principal, NCCoE/MITRE 
  • Dan Harkins, Fellow, HPE Aruba  
  • Danny Jump, Senior Product Manager, HPE Aruba  
  • Michael Richardson, Chief Scientist, Sandelman Software Works  
  • Craig Pratt, Lead Software Engineer, CableLabs 
  • Darshak Thakore, Principal Architect, CableLabs 
  • Andy Dolan, Senior Security Engineer, CableLabs 
  • Brecht Wyseur, Senior Product Manager and Product Strategy, Kudelski IoT 
  • Nick Allott, CEO, NquiringMinds  
  • Steve Clark, Security Technologist, SEALSQ, a division of WISeKey

Contact Us

If you have any questions about this event, please reach out to the team at [email protected].  

To receive the latest project news and updates, consider joining the NCCoE IoT Onboarding Community of Interest (COI). You can sign up by completing the COI form here or by emailing the team declaring your interest. 

View Agenda and Register


Nist: My Research Can Help Protect You — and Your Company — From Hackers Trying to Steal Your Money and Information

My Research Can Help Protect You — and Your Company — From Hackers Trying to Steal Your Money and Information A person sitting at a laptop is holding a cellphone with a padlock showing on the screen. A scene from the movie Ocean’s 8 provides a surprisingly useful lesson on cybersecurity. The character played by Rihanna needs to hack into a security person’s computer. She looks up his social media to find he loves corgis. The Rihanna character sends him a phishing email featuring corgis, and he can’t help but click on it. With one click of a mouse, someone can accidentally give away their company’s secrets, their bank account information, or an organization’s medical records.
Read More

Microsoft Learning Updates

Learning
Documentation Learn how to enable Advanced Security in your Azure Repos >
Step by step tutorial to enable Advanced Security at the organization, project, or repository level.  
Challenge Microsoft Azure Developer Cloud Skills Challenge > In under 30 hours, you’ll learn about storing data in Azure, creating serverless applications, connecting your services together, and more.  
Learning path Learn how to provision and manage Azure AI Services > This learning path helps prepare you for Exam AI-102: Designing and Implementing a Microsoft Azure AI Solution.  

NIST Cybersecurity Awareness Month 2023 Blog Series | Updating Software

It’s week three in our Cybersecurity Awareness Month blog series! 

This week, we interviewed NIST’s Michael Ogata (Computer Scientist) and Paul Watrobski (IT Security Specialist) about the importance of updating software.

  1. This week’s Cybersecurity Awareness Month theme is ‘updating software.’ How does your work/specialty area at NIST tie into this behavior?

NIST’s Applied Cybersecurity Division’s core mission is to explore, measure, and evaluate both the cybersecurity guidance NIST provides as well as industry best practices. One of our current projects involves putting the practices described in NIST 800-218 Secure Software Development Framework (SSDF) into action. Many people think of updating software in the context of “that thing that happens randomly after I purchase a piece of software”…but today’s continuous integration and continuous delivery (CI/CD) environments—and the rapid pace of software evolution—tightly couple software updates into the daily functionality of many systems…

Read the Blog

Active Exploitation of Cyber Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released this Joint Cybersecurity Advisory in response to the active exploitation of CVE-2023-22515 . This recently disclosed vulnerability affects certain versions of Atlassian Confluence Data Center and Server, enabling malicious cyber threat actors to obtain initial access to Confluence instances by creating unauthorized Confluence administrator accounts. Threat actors exploited CVE-2023-22515 as a zero-day to obtain access to victim systems and continue active exploitation post-patch. Atlassian has rated this vulnerability as critical; CISA, FBI, and MS-ISAC expect widespread, continued exploitation due to ease of exploitation.
CISA, FBI, and MS-ISAC strongly encourage network administrators to immediately apply the upgrades provided by Atlassian. CISA, FBI, and MS-ISAC also encourage organizations to hunt for malicious activity on their networks using the detection signatures and indicators of compromise (IOCs) contained in this advisory. If a potential compromise is detected, organizations should apply the incident response recommendations found in this advisory.
For additional information on upgrade instructions, a complete list of affected product versions, and IOCs, see Atlassian’s security advisory for CVE-2023-22515. While Atlassian’s advisory provides interim measures to temporarily mitigate known attack vectors, CISA, FBI, and MS-ISAC strongly encourage upgrading to a fixed version or taking servers offline to apply necessary updates.

NoEscape Ransomware

The US Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) released this Analyst Note to provide awareness of NoEscape ransomware.
A relatively new threat actor and ransomware to the cybercriminal community, NoEscape ransomware emerged in May 2023, but is believed to be a rebrand of Avaddon, a now defunct ransomware group shut down in 2021. Unlike many of its contemporaries, however, the unknown developers of this ransomware claim that in lieu of using source code or leaks from other established ransomware families, they have constructed their malware and its associated infrastructure entirely from scratch. Using unique features and aggressive multi-extortion tactics, in just under a year, it has targeted multiple industries, including the Healthcare and Public Health (HPH) sector. Their recent activities highlight the prominence and influence they have as a Ransomware-as-a-Service (RaaS) group.
This HC3 Analyst Note provides an overview of the group, possible connections to the Avaddon threat group, an analysis of NoEscape’s ransomware attacks, its target industries and victim countries, sample MITRE ATT&CK techniques, recommended defense and mitigations against the ransomware,  and is being provided to assist agencies and organizations in guarding against the persistent malicious actions of cyber criminals.

Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure

Now Available — Final NIST IR 8473, Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure

The NIST NCCoE has published the final version of NIST Internal Report (NIST IR) 8473, Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure

Overview

This Profile is designed to be part of an enterprise risk management program to aid organizations in managing threats to systems, networks, and assets within the Electric Vehicle Extreme Fast Charging Infrastructure (EV/XFC) ecosystem (it is not intended to serve as a solution or compliance checklist). 

The Profile is an application of the NIST Cybersecurity Framework Categories and Subcategories in the context of the EV/XFC cybersecurity ecosystem as provided by the Department of Energy’s (DOE) Office of Cybersecurity, Energy Security, and Emergency Response and Office of Energy Efficiency and Renewable Energy and Electric Power Research Institute. It is a non-regulatory, voluntary profile intended to supplement, not replace, an existing risk management program or the current cybersecurity standards, regulations, and industry guidelines that are in current use by the EV/XFC industry.

The Profile also provides ecosystem relevant parties with a means to assess and communicate their cybersecurity posture in a manner consistent with the Framework. It also offers users an industry level risk-based approach for managing cybersecurity activities and facilitates cross-collaboration between industry parties, vendors, and end users.

Use of the Profile will help organizations:

  • Identify key assets and interfaces in each of the ecosystem domains.
  • Address cybersecurity risk in the management and use of EV/XFC services.
  • Identify the threats, vulnerabilities, and associated risks to EV/XFC services, equipment, and data.
  • Apply protection mechanisms to reduce risk to manageable levels.
  • Detect disruptions and manipulation of EV/XFC services.
  • Respond to and recover from EV/XFC service anomalies in a timely, effective, and resilient manner.

What changed from the draft to final Profile?

We received over 220 comments. Based on the input received, a few major changes from the draft to final Profile include:

  • Added additional informative references for applicable subcategories, including: NIST Special Publication (SP) 800-207 Zero Trust Architecture, International Organization for Standardization (ISO) ISO/SAE 21434, and International Organization for Standardization (ISO) 24089.
  • Added acknowledgements for individual contributors from the COI and public comment period.
  • Updated content in the subcategories to better articulate relevancy to specific domains within the EV XFC ecosystem.
  • Updated front matter language to represent the rapid growth of EV vehicles globally.

Questions? Email the team at [email protected].

View the Publication

HTTP/2 Rapid Reset Vulnerability

Researchers and vendors have disclosed a denial-of-service (DoS) vulnerability in HTTP/2 protocol. The vulnerability (CVE-2023-44487), known as Rapid Reset, has been exploited in the wild beginning in August 2023 through October 2023.
The Cybersecurity and Infrastructure Security Agency (CISA) recommends organizations that provide HTTP/2 services apply patches when available and consider configuration changes and other mitigations discussed in the references below. For more information on Rapid Reset, see:
Cloudflare: HTTP/2 Rapid Reset: deconstructing the record-breaking attack Google: How it works: The novel HTTP/2 ‘Rapid Reset’ DDoS attack AWS: CVE-2023-44487 – HTTP/2 Rapid Reset Attack NGINX: HTTP/2 Rapid Reset Attack Impacting NGINX Products
Organizations can take proactive steps to reduce the effects of DoS attacks. See the following guidance for more information:
CISA: Understanding and Responding to Distributed Denial-of-Service Attacks CISA: Additional DDoS Guidance for Federal Agencies