FTC Submits Comment on March-In Rights to Promote Efforts to Lower Drug Prices

  • Post author:
  • Post category:

Enforcement We enforce federal competition and consumer protection laws that prevent anticompetitive, deceptive, and unfair business practices. View Enforcement , Search or browse the Legal Library Find legal resources and guidance to understand your business responsibilities and comply with the law. Browse legal resources Search small Search , Take action Report an antitrust violation File

Continue ReadingFTC Submits Comment on March-In Rights to Promote Efforts to Lower Drug Prices

CISA Announces Renewal of the Information and Communications Technology Supply Chain Risk Management Task Force

  • Post author:
  • Post category:

February 06, 2024,WASHINGTON - Today, the Cybersecurity and Infrastructure Security Agency (CISA) announced a two-year renewal of the Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force. The Task Force, chaired by CISA’s National Risk Management Center (NRMC) and the Information Technology (IT) and Communications Sector Coordinating Councils, is a public-private partnership

Continue ReadingCISA Announces Renewal of the Information and Communications Technology Supply Chain Risk Management Task Force

CISA Releases Two Industrial Control Systems Advisories

  • Post author:
  • Post category:

CISA released two Industrial Control Systems (ICS) advisories on February 6, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-037-01 HID Global Encoders ICSA-24-037-02 HID Global Reader Configuration Cards CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations.

Continue ReadingCISA Releases Two Industrial Control Systems Advisories

ICS Advisory: HID Global Reader Configuration Cards

  • Post author:
  • Post category:

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Low attack complexity Vendor: HID Global Equipment: Reader Configuration Cards Vulnerability: Improper Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to read the credential and device administration keys from a configuration card. Those keys could be used to create malicious configuration

Continue ReadingICS Advisory: HID Global Reader Configuration Cards

ICS Advisory: HID Global Encoders

  • Post author:
  • Post category:

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.9 ATTENTION: Exploitable locally Vendor: HID Global Equipment: iCLASS SE, OMNIKEY Vulnerability: Improper Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to read data from reader configuration cards and credentials. Reader configuration cards contain credential and device administration keys which could be used

Continue ReadingICS Advisory: HID Global Encoders