top of page
Newsletter.png

Welcome to Our Newsletter 

This month, ISEC7 will cover the new FAR CUI Rule and its implications, delve into the recent fake CAPTCHA scam and best practices for authentication, spotlight our newest solution ISEC7 SEVENCEES, and bring you up to speed on CISA’s Traffic Light Protocol for secure information sharing.

CUI image.png
FAR CUI

Advisory: New FAR CUI Proposed Rule

On January 15, 2025, the Department of Defense (DoD), General Services Administration (GSA), and the National Aeronautics and Space Administration (NASA) published a proposed amendment to the Federal Acquisition Regulation: Controlled Unclassified Information (FAR Case 2017-016), or “FAR CUI Rule.” It presents critical updates on managing Controlled Unclassified Information (CUI) in federal contracts,
aiming to establish uniform requirements for handling CUI across federal solicitations and contracts.

 

This rule is significant as it seeks to standardize the currently fragmented cybersecurity requirements that contractors face, ensuring consistent protection of sensitive information while addressing gaps in current policies. By implementing this rule, the government aims to enhance the security of CUI, which includes information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies. The rule affects all federal contractors, including those who may not have previously been subject to stringent cybersecurity obligations. All contractors will now need to invest in appropriate measures to protect CUI, similar to those required of defense contractors. This move is expected to bring greater clarity and certainty regarding the protection obligations associated with federal contracts, ultimately strengthening the overall security posture of federal information systems.

 

For those who must adhere to the new FAR CUI or CMMC rules, please don’t hesitate to reach out to the ISEC7 team with any questions you may have. Additionally, ISEC7 Government Services previously published a blog post about the requirements of protecting CUI and available resources, including ISEC7’s data marking and classification tool ISEC7 CLASSIFY.

FAR CUI.png

Best Practices: Authentication & Verification

Best Practices

Cybersecurity researchers are highlighting a new malware campaign that uses fake CAPTCHA verification checks to deliver the notorious Lumma information stealer. Cybercriminals trick users by presenting fakeCAPTCHA verification checks that look like the real ones you often see online. When users encounter these fake CAPTCHAs, they are asked to prove they are human by clicking a button or following specific instructions. However, instead of just verifying their identity, these actions secretly trigger a harmful process. The fake CAPTCHA prompts users to copy and paste a malicious script into their computers command line, which then installs the Lumma information stealer. This malware silently collects sensitive information like login credentials, banking details, and personal files from the infected device, potentially leading to identity theft and financial loss.


With this malware campaign spanning several countries and multiple industries, the experts at ISEC7 would like to share our updated guidance when it comes to authentication. First, it's crucial to stay vigilant and cautious online; always be skeptical of CAPTCHAs that ask you to perform unusual actions, such as copying and pasting commands or running scripts. Legitimate CAPTCHAs typically only require you to identify images or enter text. It’s also always best to use multi-factor authentication (MFA), which requires you to provide two or more verification factors to gain access. By combining multiple forms of authentication, MFA reduces the risk of identity theft, data breaches, and other cyberthreats. However, using an authenticator app for MFA is generally more secure than relying on text messages, as authenticator apps generate unique, time-based codes directly on your device, making it much harder for cybercriminals to intercept them. Lastly, don’t forget the tried and true precautions of ensuring your antivirus and anti-malware software is up to date, as these tools can help detect and block malicious activities, and regularly updating your operating system and applications to patch any vulnerabilities
that could be exploited by malware.


With the cyberthreat landscape and business needs always changing, it’s a good idea to periodically reassess your security posture. The team at ISEC7 can provide an objective assessment of what can address the needs of your organization and/or risk mitigation needed to enhance your current solution. Feel free to contact us for consultation or if you have any questions as your organization reviews its
security posture.

Solution Highlight: ISEC7 SEVENCEES

SEVENCEES

For organizations assessing their security posture and business needs, look no further than the in-depth and tailored mobile security framework ISEC7 SEVENCEES. Designed around end-to-end security and traffic obfuscation to the mobile endpoints, ISEC7 SEVENCEES leverages existing infrastructure to create a bespoke solution addressing the business needs of organizations whilst securing traffic across potentially compromised networks. At the core of ISEC7 SEVENCEES is ISEC7 SPHERE, the all-encompassing IT management and monitoring platform that can be leveraged with your existing technology investments and provides insights into system health, compliance, and monitoring for indicators of compromise of all the underlying solutions addressing your needs.

 

In an era where cybersecurity threats are constantly evolving, organizations need a solution that not only addresses these challenges but also integrates seamlessly with existing infrastructure to optimize costs and operational efficiency. The ISEC7 SEVENCEES platform provides a comprehensive, technology-agnostic solution built on Zero Trust Architecture, ensuring quantum-safe security and robust protection for all endpoints. By leveraging existing network elements and offering a flexible, scalable solution, ISEC7 SEVENCEES empowers organizations to enhance their security posture without incurring significant capital expenditures.

Traffic Light

Following CISA’s Traffic Light Protocol

Traffic Light Protocol

If your organization does not have standing internal classification, you can refer the CISA’s Traffic Light Protocol (TLP) to facilitate secure information sharing. The TLP uses color codes to indicate how sensitive information can be shared. For example, a RED designation indicates that information is highly sensitive and should only be shared with specific individuals present at the meeting or conversation;
AMBER means information can be shared within the recipient’s organization but not beyond it; GREEN means information can be shared within the community – amongst peers and partners – but not publicly; finally, CLEAR indicates that information can be shared freely and publicly without any restrictions.

 

This system helps ensure that sensitive information is shared appropriately, enhancing collaboration while protecting privacy and security. CISA’s Traffic Light Protocol is also supported by ISEC7 CLASSIFY. Not only does ISEC7 CLASSIFY support CISA’s TLP system, but it also simplifies the data marking and classification system and verifies that proper permissions are granted to the sender and recipients before sending, along with tracking for statistics and auditing. Please contact us about ISEC7 CLASSIFY or CISA’s Traffic Light Protocol and we would be happy to answer any questions you may have and provide a demo.

Artificial Intelligence (AI) is proving itself to be one of the most transformative technologies of our time, yet its definition and implications can often seem elusive.

The race for AI dominance has been in the news a lot lately, as it has become a key component of global geopolitical and economic competition. At its core, AI refers to the ability of machines to simulate human intelligence, which includes learning from experience, understanding natural language, recognizing patterns, and making decisions.

ISEC7 Cybersecurity Trivia

Did You Know: Valentine’s Edition

Around Valentine's Day, there is a significant increase in phishing emails disguised as lovemletters or romantic messages. For example, in 2019 cybercriminals used the subject line "This is my love letter to you" to spread GandCrab ransomware.

LinkedIn

Never miss an update! Follow us on LinkedIn: 
ISEC7 Group & ISEC7 Government Services 

ISEC7 Group

8 Market Place, Suite 402, Baltimore, MD 21202, USA
Tel:  
(866) 630-1893 | sales-na@isec7.com  www.isec7.com

New Logo Newsletter Footer.png
bottom of page