

Description:
There has recently been a new Google account takeover scam that has become prevalent around the United States. In this AI-generated scam, the threat actors are spoofing phone numbers to appear to be coming from Google support in Mountain View, CA, and are attempting to get users to provide information that would enable the threat actor to gain unauthorized access into the user’s Google account.
Recommended Actions:
Take Action Now: Ensure that your organization is on the lookout for this ongoing scam, and that all employees and contractors are careful with their personal or business account credentials.
External Links:
Description: On September 27, 2024, a vulnerability was identified in specific Okta configurations whereby an attacker with valid credentials could bypass configured conditions within application-specific sign-on policies. These conditions could include use of network zones, device-type restrictions or authentication requirements set outside of the Global Session Policy. After investigation, we determined that this vulnerability was introduced as part of a release that occurred on July 17th, 2024.
Recommended Actions:
Customers who were on Okta Classic as of July 17, 2024, and who meet the above conditions are advised to review the Okta System Log for unexpected authentications from user-agents evaluated by Okta as “unknown” between July 17, 2024 and October 4, 2024 using the following query: outcome.result eq “SUCCESS” and (client.device eq “Unknown” OR client.device eq “unknown”) and eventType eq “user.authentication.sso”
Take Action Now:
External Links:
Description: The September 25, 2024, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication includes 11 Cisco Security Advisories that describe 11 vulnerabilities in Cisco IOS Software and Cisco IOS XE Software.
Recommended Actions:
Take Action Now: Review the Security Advisory Table to check if any vulnerability affects your environment and patch accordingly.
External Links: