Wishing You Happy Holidays and a Wonderful New Year

As the holiday season is upon us, I want to take a moment to express my heartfelt gratitude for your support, collaboration, and trust throughout the year. Whether you've been a customer, a partner, or an attendee at one of my talks, you've played a vital role in making this year meaningful and impactful. The holidays are a time to reflect on our shared successes and to look forward to the opportunities that lie ahead. Your contributions to our journey have been invaluable, and I'm honoured to have worked with you this year. From everyone here at Critical Path Security, we wish you and your loved ones a joyous holiday season filled with peace, happiness, and cherished memories. May the New Year bring renewed energy, prosperity, and continued success. Warmest wishes, Patrick Kelley CEO, Critical Path Security

0 Comments

Protecting Mobile Communications Against Cyber Threats

Executive Summary The Cybersecurity and Infrastructure Security Agency (CISA) has issued critical guidance to mitigate cyber espionage activities targeting telecommunications infrastructure, particularly those linked to threat actors from the People's Republic of China (PRC). These activities compromise sensitive information, including call records and private communications, posing significant risks to highly targeted individuals, such as senior government officials and executives. This report summarizes actionable best practices from CISA's guidance to protect mobile communications and mitigate risks associated with these threats. While these measures are aimed at individuals at high risk, they are universally applicable for enhancing mobile security. Recommendations Overview General Best Practices Use End-to-End Encrypted Communication: Applications like Signal provide secure messaging, voice, and video communication across platforms. Evaluate applications based on metadata collection policies and privacy-enhancing features like disappearing messages. Implement Phishing-Resistant Multifactor Authentication (MFA): Replace SMS-based MFA with FIDO-based authentication methods such as security keys (e.g., Yubico, Google…

0 Comments

Protecting Water Systems: A Look at Cyber and Physical Threats in the WWS Sector

Water is life. It's not just a dramatic phrase; it's the truth. The Water and Wastewater Systems (WWS) sector keeps us healthy, clean, and functioning as a society. Yet, like any other critical infrastructure, it's under siege-both virtually and physically. Cyber attacks have been steadily climbing the list of concerns, while physical threats linger in the shadows, waiting for someone with a grudge or an agenda. The threat landscape against water systems has grown sharper in focus, from ransomware crippling operations to insiders sabotaging chlorine pumps. And while the impacts may seem isolated, the WWS sector doesn't have the luxury of failure. Let's break down the threats lurking in the water. Cyber Threats: The Silent Intruders 1. Cyber Criminals: Holding Water Hostage Cyber criminals have already proven they can paralyze water utilities. Since late 2020, ransomware attacks against WWS facilities have been disturbingly successful. These attacks typically exploit weak remote…

0 Comments

Keeping Your Admin Portals Private

The most vulnerable points in a web application is the admin login page, which, if exposed, can become a gateway to severe security breaches, data loss, and reputational damage. This report examines the risks associated with exposed admin login pages and outlines actionable strategies to mitigate them. 1. Brute Force Attacks An exposed admin login page is a primary target for brute force attacks, where attackers systematically attempt various username and password combinations. Without adequate security measures, such attempts can lead to unauthorized access. Mitigation Strategies: Account Lockout Policies: Implement lockouts after a predetermined number of failed login attempts. CAPTCHA Integration: Incorporate CAPTCHA to distinguish between human users and automated bots. Multi-Factor Authentication (MFA): Add an additional layer of authentication to prevent unauthorized access. 2. Credential Stuffing Attackers exploit reused passwords by leveraging credentials obtained from previous breaches. Known as credential stuffing, this technique can be devastating if strong password…

0 Comments