Throwback Attack: Ireland ransomware attack costs HSE $83 million
HSE has been described as one of the most significant digital assaults on a health care system in recent memory.
Home | Tyler Wall | View All
HSE has been described as one of the most significant digital assaults on a health care system in recent memory.
AT&T Cybersecurity released their 2023 Edge Ecosystem report about changes within the edge space and how it’s impacting industry sectors.
The Davis-Besse nuclear plant fell victim to the Slammer worm, showing the consequences of cyberattacks on nuclear facilities.
Critical infrastructure is under attack. ICSP talked to Victor Atkins of 1898 and Co. about protecting critical infrastructure.
Xenotime, the Russian threat group responsible for the TRISIS attack in Saudi Arabia, probed the U.S. power grid.
A Ukrainian railway cyberattack hit the nation’s vital transport system, underscoring the urgent need for enhanced cybersecurity measures.
Schreiber Foods, a part of the food and agriculture sector, was hit by a cyberattack on their computer systems used for organizing raw milk
In 2016, Gundremmingen nuclear power plant was one of the few reported cyberattacks on a nuclear power plant in Europe
The Wall Street Journal held a webinar, “Mitigating Cyber Risk,” to discuss cybersecurity best practices in an evolving industry
An airport in Bristol, England, incurred a ransomware attack, showing the vulnerabilities in the transportation sector.
Honda was hit by a ransomware called SNAKE ransomware, an industrial control system-specific malicious malware.
What caught our readers’ attention in 2022? Here are the top 10 Industrial Cybersecurity Pulse articles or the past year.
A natural gas operator was hit by a ransomware attack via a spear-phishing campaign that resulted in a two-day shutdown of operations.
Threat actors impact two U.S. satellites, in a critical infrastructure attack that could have knocked them out of orbit.
An ethical hacker drops a DDoS attack on a children’s hospital, threatening critical infrastructure and the patients.
As the world becomes more and more connected, managing and mitigating cybersecurity risk with a SOC is a step toward cyber cleanliness.
Defending and responding to cybersecurity breaches is an important part of gaining new and better security practices.
An Air Force base in Nevada fell victim to a malware attack that used keylogging to gain access to drone systems.
Limestone’s sewage treatment facility fell victim to a ransomware attack and proved that all businesses need cybersecurity best practices.
Senior Analyst Fernando Montenegro spoke on the evolution of ransomware at Black Hat 25 in Las Vegas, Nevada.
At Black Hat 25, Omdia Senior Principal Analyst Rik Turner spoke on zero trust and its place in the current landscape.
Recently, we have developed a higher level of digital dependence, which has called for an increase in cyber resilience.
Nuclear power plants are one of the most efficient ways to produce energy. At the same time, they can be dangerous because of the potential devastation from a meltdown or explosion. Either scenario would result […]
In recent years, private companies and critical infrastructure alike have felt the full force of cyberattacks. This has put cybersecurity on the forefront of everyone’s mind, as people try to remain a step ahead of […]
As society has delved deeper into the fourth — and soon to be fifth — industrial revolution, technology has become more woven into our everyday lives. Once upon a time, smart technology was found only […]
Critical infrastructure has always been a major target of threat actors around the world. For some, they strive to hit society at its most critical points (energy grids, water facilities, etc.). Some adversaries do it […]
In 2014, a Siemens building in Monroeville, Pennsylvania, began to experience unusual crashes in their custom automated spreadsheets. Little did they know that this would be the first of many crashes in the two years […]
As society has progressed into a more technological era, an increase in cyberattacks has logically followed suit. Any technology connected to the internet — or even capable of a Bluetooth connection — is susceptible to […]
In April 2020, Israel suffered a cyberattack on their water facilities were lucky enough to avoid the consequences. The threat actors attempted to hack into the industrial control systems (ICS) of five Israeli Water Authority […]
Ransomware attacks have plagued the cybersecurity industry for years, and they’re coming at an increasing rate. In late April, Sophos, a software security company, released data and analysis from a survey on the state of […]
In today’s world, having cyberliteracy is crucial to protecting yourself from a cyberattack. Threat actors have the ability to hack virtually any device. With the right information, almost anything is vulnerable to them, from passwords […]
On April 4, 2022, Secretary of State Antony Blinken released a statement announcing the creation of a “new” federal bureau — the Bureau of Cyberspace and Digital Policy (CDP). Even though the organization is the […]
In the midst of the Cold War, the Central Intelligence Agency (CIA) launched a trojan horse code, dubbed a logic bomb, on the Soviet Union. This attack would go down in history as one of […]
It was June 1, 1990, and KIIS-FM was running a competition for callers to win a new Porsche 944 S2. All they had to do was be caller No. 102. However, not everyone who tried […]
On March 24, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI) and Department of Energy (DOE) released a joint Cybersecurity Advisory (CSA) providing information on previous Russian cyberattack campaigns spanning from […]
On March 21, President Biden released a statement discussing the United States’ cybersecurity concerns over potential Russian cyberattacks. Russia began its invasion to claim Ukraine a month ago, setting the world on high alert for […]
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.