
Moving to Proactive Cybersecurity: Cyber Awareness Podcast, Madison Horn, Critical Fault
Madison Horn discusses the move to proactive cybersecurity, the value of the shared responsibility model and the rise of quantum computing.
Madison Horn discusses the move to proactive cybersecurity, the value of the shared responsibility model and the rise of quantum computing.
Steve Stone talked about how accessible cheap data storage and analytics have become and why breaches are inevitable.
A former hacker asks “What is the worst a hacker could do,?” and discusses how has generative AI changed the equation.
Dr. Jesus Molina talks about threats to critical infrastructure, cyber-informed engineering and how AI is more beneficial to attackers.
Cybersecurity insights Increasing connectivity and complexity in operational technology systems pose growing cybersecurity challenges for critical infrastructure. While AI offers potential benefits, both defenders and attackers are leveraging its capabilities, highlighting the need for vigilant […]
Five subtle yet pressing threats and the holistic measures you can employ to help fortify your cybersecurity posture.
Lesley Carhart discusses how to make hackers lives more difficult and why it’s essential to prepare for a cyber incident before it happens.
Mike Nelson, of CyberCX, talks about how to avoid cyber scams and why cybersecurity risk is really a business risk.
Supply and demand issues during the pandemic revealed how fragile supply chains can be, particularly with the increased threat of cyberattacks.
When it comes to the modern cybersecurity landscape, no one is secure, no matter how large or small a company is. Even if a company puts tremendous resources into securing its systems, hackers will likely […]
Sonar is a new AI-enabled browser extension designed to help detect phishing emails and enhance cybersecurity
The top 5 articles from August 2023 covered how to build an effective cyber strategy and the government impact on OT cyber risk.
Lesley Carhart talks about working in incident response, a power plant that turned on by itself and the maturity journey of OT cybersecurity.
Biometric data is a valuable target for cybercriminals, and hacking of this type of data is becoming a popular manner of identity theft.
ICS Pulse talked to Dr. Jesus Molina about the physical consequences of cyberattacks and what it means for your industrial environment.
Debbie Gordon, of Cloud Range, discusses the dangers of human vulnerabilities and why cyber practitioners need to have more than just skills.
Water and wastewater is critical to national security, economic stability and public health. Here’s how to protect it from cyber threat.
Thomas Pace discusses the prevalence of ransomware, the danger of supply chain attacks and how SBOMs can help secure systems.
Bot attacks on industrial control systems are becoming a focal point, as they are capable of causing harm to critical infrastructure.
In 2022, Canada’s SickKids hospital was hit by LockBit ransomware, which impacted its internal systems, phone lines and website.
Thomas Pace of Netrise discusses his background, what the government does well versus private industry and vulnerability management.
HSE has been described as one of the most significant digital assaults on a health care system in recent memory.
As nation-state attacks continue to rise, the energy sector must continue to security its assets from threat actors.
In 2012, the OilRig cyber espionage group began targeting the oil and gas industry and other critical infrastructure in the Middle East.
The Claroty Platform extracts critical data by monitoring all network communication, establishing a high-fidelity baseline model for rapid detection of anomalous behavior. Combining native OT knowledge with advanced models and algorithms, Claroty produces context-rich alerts […]
The top 5 from April 2023 covered the Biden administration’s National Cyber Strategy, cyber simulation training and the risks of connectivity.
From the first day of the 2023 RSA Conference, it was clear that the cybersecurity risks of ChatGPT would be a popular topic.
Annual phishing report highlights new phishing campaigns resulting from the rise of AI platforms urges organizations to adopt a zero trust.
The Davis-Besse nuclear plant fell victim to the Slammer worm, showing the consequences of cyberattacks on nuclear facilities.
The ICS Pulse Podcast talked to Ben Miller of Dragos about the Year in Review report and other cybersecurity trends in the industry.
To realize maximum value in industrial environments, seamless and transparent connectivity is needed from the plant floor to the cloud.
The first recorded phishing cyberattack took place in the mid-1990s and was carried out by a group of hackers who targeted America Online (AOL) users.
Xenotime, the Russian threat group responsible for the TRISIS attack in Saudi Arabia, probed the U.S. power grid.
The AW North Carolina cyberattack was an excellent example of why just-in-time manufacturing and ransomware can be a toxic mix.
Five key predictions, pulled from a range of cybersecurity analysts and experts, that are expected to emerge as 2023 progresses.
Ritesh Agrawal of Airgap Networks talks about protecting critical infrastructure and the value of zero trust in complex OT networks.
In 2014, Korea Hydro and Nuclear Power in South Korea suffered a cybersecurity incident that was blamed on their neighbors to the north.
CISA assesses that the United States and European nations may experience disruptive attacks against websites because of the invasion of Ukraine.
A recent data study on cybersecurity risk looked at which U.S. states had suffered the most data breaches in 2022.
A Dole cyberattack caused the food giant to temporarily shut down production plants in North America and halt shipments to grocery stores.
The RSA SecurID attack was a wake-up call about the vulnerability of two-factor authentication and the importance of the supply chain.
The first PC, MS-DOS virus, the Brain virus, jumped its way from computer to computer – via floppy disk, no less – back in 1986.
Today, CISA and the FBI released a joint Cybersecurity Advisory, ESXiArgs Ransomware Virtual Machine Recovery Guidance.
At a Dragos event, CEO Robert M. Lee discussed the evolution of critical infrastructure cybersecurity, breaking it down into four key eras.
Insider attacks are on the rise, and they can be even more dangerous because they know where an organization’s sensitive data lives.
Foxconn, although a massive company, was targeted by two different ransomware groups within a few years of each other.
The top 10 Throwback Attack articles of 2022 range from a Florida teenager hacking into NASA to a mistaken attack on a tiny New York dam.
Operation Aurora was a cyberattack on dozens of high-tech, security and defense companies that helped solidify the new era of cyber threat.
How can the utilities sector mitigate cybersecurity threats to ensure commercial operations are not compromised?
Threat actors impact two U.S. satellites, in a critical infrastructure attack that could have knocked them out of orbit.
A UN report warns that people’s digital rights to privacy are coming under greater pressure from the use of networked digital technologies.
In 2008, the United States DoD was infected with malware, giving rise to a defensive program called Operation Buckshot Yankee.
In 2016, waves of Operation Ghoul cyberattacks struck industrial, engineering and manufacturing organizations in more than 30 countries.
Critical infrastructures have faced many cyber threats, and the next attack could be around the corner because of the vulnerabilities.
How can you guard against supply chain attacks, what are the lessons to be learned and who should be in charge of supply chain security?
Dynamite Panda stole 4.5 million patient records from Community Health Systems, one of the largest hospital operators in the U.S.
In 2007, Red October, a high-level cyber espionage campaign, targeted embassies, research facilities, nuclear, aerospace, and oil and gas.
The supply chain is vulnerable both upstream and downstream. Here’s how can companies can better defend against supply chain attacks.
An Air Force base in Nevada fell victim to a malware attack that used keylogging to gain access to drone systems.
With supply chain attacks, you can have excellent cybersecurity, but if you’re working with vendors that don’t, you’re still at risk.
A report detailed a sustained campaign focused on exploiting networking devices across critical infrastructure
MuddyWater targets a wide range of organizations, including telecommunications, defense, local government, and oil and natural gas sectors.
Supply chain attacks insights Traditional cyberattacks are a one-to-one relationship between adversary and target. With the supply chain, it becomes a force multiplier because a single attack can be the access point to multiple targets. […]
A tabletop exercise can help companies achieve digital safety and peace of mind that their industrial manufacturing equipment is protected.
Back in 2015, a cyberattack hit LOT Polish Airways, grounding aircraft and stranding thousands of passengers at Poland’s busiest airport.
Limestone’s sewage treatment facility fell victim to a ransomware attack and proved that all businesses need cybersecurity best practices.
Suzanne Gill investigates the network security threats currently facing the operational technology (OT) environment today.
Cybersecurity revenue is up, as security has emerged as a top priority for organizations and consumers alike.
Advanced persistent threats (APTs), such as Holmium, can stay hidden for years without discovery, all while collecting private information from companies.
Cybersecurity revenues in the insurance sector are set to grow at a compound annual rate of more than 10%, from $6.4 billion in 2020 to $10.6 billion in 2025.
Four years after Shamoon’s initial cyberattack, security experts discovered evidence of a new malware, Shamoon 2, targeting organizations in Saudi Arabia.
In 2014, the White House experienced a cyberattack on its network, which could have risked classified information and critical infrastructure.
Senior Analyst Fernando Montenegro spoke on the evolution of ransomware at Black Hat 25 in Las Vegas, Nevada.
Black Hat 25: A team from IBM set out to create a more effective, open, community-sourced threat hunting framework.
Bahrain’s national oil company was struck in 2019 with the Dustman malware; however, this attack didn’t have the same outcome as Colonial.
Cybersecurity Insights Hackers have many ways to exploit vulnerabilities in various types of technology. Staying ahead of potential vulnerabilities and preventing attacks poised researchers at USC to develop a new approach to identify security liabilities. […]
What are the immediate cybersecurity challenges, what is the future of cyber warfare and what should people be focused on to prevent attacks?
When Julian Gutmanis — a cyber first responder — discovered TRISIS malware at a petrochemical plant in Saudi Arabia, his blood ran cold, according to MIT Technology Review. TRISIS malware was first detected in 2017 […]
A recent cybersecurity advisory alert details the Top 15 Common OT Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited. There have been multiple other […]
In recent years, cybersecurity in critical infrastructure has been at the forefront of people’s minds. With attacks on the U.S.’s critical infrastructure, such as Colonial Pipeline, Kemuri Water Company and many more, cybersecurity threats aren’t […]
Industroyer, or Crashoverride, is the first of many cybersecurity threats that is designed solely to attack power and electrical grids. It is also one of four cybersecurity threats found thus far that targets Industrial Control […]
Attacks on critical infrastructure increased by 3,900% from 2013 to 2020 (Gartner), and 55% of OT security practitioners rate ransomware as the #1 threat to OT systems (SANS), which is double the percentage from 2019. Why? […]
Critical infrastructure has always been a major target of threat actors around the world. For some, they strive to hit society at its most critical points (energy grids, water facilities, etc.). Some adversaries do it […]
In 1989, the first known ransomware attack occurred; 33 years later we are still being faced with more varied and complex ransomware incursions. Over the years, threat actors have found innovative ways to exploit vulnerabilities […]
The media focuses most of its attention on information security threats that originate outside of an organization. Whether it is the discovery of a new advanced persistent threat (APT) or a company breach, generally one […]
One of the most complex threats ever founded, according to Kaspersky Labs, Flame malware targeted Iran and other Middle Eastern countries with a cyber-espionage attack that researchers had little precedent for. Given the intricacies and […]
In 2014, a Siemens building in Monroeville, Pennsylvania, began to experience unusual crashes in their custom automated spreadsheets. Little did they know that this would be the first of many crashes in the two years […]
Every insidious and pervasive menace plaguing society has to begin somewhere. As more and more devices are connected to networks and information is shunted to the cloud, industrial cyberattacks continue to rise. Sophos’ recent State […]
Ransomware attacks have plagued the cybersecurity industry for years, and they’re coming at an increasing rate. In late April, Sophos, a software security company, released data and analysis from a survey on the state of […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) put out a Shields Up advisory in conjunction with Russia’s invasion of Ukraine. It’s probably necessary, as they would have been disparaged if they didn’t, and not […]
It has been one-year since the high-profile ransomware attack on energy pipeline operator Colonial Pipeline, which led to widespread fuel shortages along the East Coast. Add to that the later news that the U.S. Department […]
In today’s world, having cyberliteracy is crucial to protecting yourself from a cyberattack. Threat actors have the ability to hack virtually any device. With the right information, almost anything is vulnerable to them, from passwords […]
Ransomware has taken the world by storm, and informational technology (IT) is not the only technology affected. Operational technology (OT), which is increasingly blending with IT, is also susceptible to ransomware tactics, techniques and procedures […]
Since Russia made its initial incursion into Ukraine, the world has been wondering where the superpower will strike next. However, the next strike likely won’t be a physical attack, but rather will occur in the […]
As an organization’s security awareness grows, it’s important to know what cybersecurity tactics to communicate to the workforce during these unprecedented times. As security professionals, it is important to keep the communications calm, simple and […]
In parallel to the global COVID-19 pandemic, there has been a growing ransomware pandemic. Researchers discovered that ransomware attacks on U.S. organizations tripled in 2021 compared to 2020 and attacks on U.K. organizations doubled. This […]
President Biden recently spoke out about cybersecurity concerns, demonstrating that the world is on high alert for impending threats. It has been a national priority to strengthen cybersecurity for the past year, especially due to […]
It was June 1, 1990, and KIIS-FM was running a competition for callers to win a new Porsche 944 S2. All they had to do was be caller No. 102. However, not everyone who tried […]
On March 24, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI) and Department of Energy (DOE) released a joint Cybersecurity Advisory (CSA) providing information on previous Russian cyberattack campaigns spanning from […]
Homomorphic encryption is considered a next generation data security technology; but researchers have identified a vulnerability that allows hackers to steal data—even as it is being encrypted. “We weren’t able to crack homomorphic encryption using […]
As Russia’s assault on Ukraine worsened last week, fears about global cybersecurity — especially the cyber safety of critical infrastructure — continued to escalate. Russia has been aggressive with cyberattacks in the past, including taking […]
In the past decade, we have seen an alarming increase in attacks on critical energy infrastructure, with cyber incidents occurring across any number of geographies and industries. Common attacks can involve ransomware on a corporation’s […]
Sometimes the gap between the unveiling of a life-altering new technology and the corruption of that technology is exceedingly small. Take, for example, wireless technology, a potent attack vector in modern times. It’s also something […]
In parallel to the global COVID-19 pandemic, there has been a growing ransomware pandemic. Darktrace researchers discovered that ransomware attacks on U.S. organizations tripled in 2021 compared to 2020, and attacks on U.K. organizations doubled. […]
In 2010, Stuxnet, one of the biggest industrial cybersecurity attacks in history, was discovered as it struck the Natanz nuclear facility in Iran. This would not be the last problem for Iran’s nuclear program, however. […]
In 2006, headlines showed that Google bought YouTube for $1.65 billion in stock, Nintendo released the Wii gaming console and NASA launched the New Horizons probe. However, many people weren’t aware of a major cybersecurity […]
If 2021 was the year of ransomware, 2022 may become the year of software supply chain attacks. The prevalence of supply chain attacks has skyrocketed, with several high-profile strikes such as SolarWinds and Kaseya making headlines. […]
In 2020, the financial services sector was the industry that experienced the most cyberattacks. For years, attackers went after these organizations because they were expectedly lucrative targets. But in 2021, the financial services sector was […]
Disruptions to the food, beverage and agriculture sectors can cause more than just spikes in prices and production delays. They can also be a threat to public safety, precipitating the sale of tainted food, financial […]
As people around the world reflect on this past year and look forward to the next, it is important to learn from past mistakes so as to not repeat them. Six years ago, Dragonfly 2.0, […]
As more and more people head back into the office, public transportation is becoming normalized again. However, a customer has to keep track of route schedules, tickets and everything else they need to lug with […]
It took only nine months for 2021 to bypass 2020 in publicly reported data breaches. By the end of September, the total number of publicly reported breaches in 2020 was already exceeded by 17%, according […]
In the throes of a military action, everything is heightened. In February 1998, the U.S. and President Bill Clinton were preparing to bomb Iraq, as the country’s then-President Sadaam Hussein refused to comply with United […]
People have come to rely on electricity, and once someone has it, it’s hard to let it go. As winter rapidly approaches, it is easy to understand why. Without electricity, there are no appliances, lights […]
Checking tracking notifications from transportation companies has become second nature for anyone who has ordered something online. Many can’t wait to see that notification saying that their package has been delivered. Imagine the surprise and […]
Back in December, Darktrace predicted that supply chain attacks would overtake CEO fraud as a top cybersecurity concern. This year, the importance of supply chains has been brought to the forefront by a series of disruptions hitting […]
When people think of ransomware, they often picture a screen blinking with an ominous skull and crossbones image, indicating that something bad is happening. In fact, search for any ransomware attack, and there’s about a […]
The challenge of reliably attributing cyber threats has amplified in recent years, as cyber criminals have adopted a collection of techniques to ensure that even if their attacks are caught, they themselves escape detection and […]
In 2017, one of the most widespread and devastating cyberattacks was perpetrated against worldwide shipping giant Maersk. It started on a quiet afternoon in June, when staffers began seeing messages advising them that their file […]
In 1988, a Harvard graduate began an experiment to see how many computers were connected to the Internet. Twenty-four hours later, 10% of all computers around the world had been taken down, and the damages […]
Ransomware has been making headlines for the last few years for the impact it’s having on businesses and government entities. The increasing prevalence of these attacks has been a wake-up call to industries around the […]
The overwhelming majority of recent cyberattacks — at least the highly publicized ones — have been primarily about one thing: money. Colonial Pipeline, SolarWinds, JBS Foods, Kia Motors, Kaseya, the Washington D.C. Police Department and […]
The SolarWinds attack impacted more than 100 companies and federal agencies, according to U.S. government estimates. The ransomware strike on software provider Kaseya reportedly affected more than 1,500 companies — 60 or so direct customers […]
Most people would be happy to open their computer to see a love letter; however, starting on May 4, 2000, the terms “love letter” and “Love Bug” took on a whole new meaning. Windows users […]
The internet was still primitive in 1988. The entire network consisted of about 60,000 people, and was mostly limited to universities, research facilities and government offices. The World Wide Web, as we know it, was […]
As Labor Day arrives once again this year, it is a great time to talk about a ransomware attack that also happened on Labor Day — the attack on the Teamsters Union in 2019. This […]
Darktrace regularly observes an increase in cyberattacks, including ransomware, carried out during holidays, weekends and outside of working hours. It is clear that such “off-peak” attacks allow easy exploitation of standard organizational practices and human […]
Cybercriminals use a broad range of malicious tactics to exploit unsuspecting victims. However, some of their methods prove to be more effective than others. According to the data presented by the Atlas VPN team, social […]
There is seldom anything good that comes from ransomware attacks, but at least San Francisco mass transit users got a few free rides during a busy Thanksgiving weekend. In November 2016, threat actors went after […]
“All war is based on deception.” — Sun Wu Tzu, “The Art of War” Influencing the Vietcong, Chairman Mao and the KGB, Sun Tzu has had a profound impact on military strategy around the world. […]
It’s more a question of when than if when it comes to ransomware. If corporations and government entities don’t allocate resources to hardening cyber defenses, these seemingly inevitable attacks can be very costly. The city […]
Some of the key provisions of the American Jobs Plan that support critical infrastructure cybersecurity include: Make $20 billion in energy infrastructure investments for state, local and tribal governments contingent on cyber modernization Create a new tax […]
Distributed network protocol 3.0 (DNP3) is the second most-widely used serial communications protocol in industrial control systems (ICS), after Modbus. As EPRI (Electric Power Research Institute) mentioned in a 2019 technical update: “it is the […]
To anyone working in cybersecurity, it is not news that just about every critical infrastructure industry is significantly behind on their path toward cybersecurity maturity. There continues to be a fundamental friction between the estimation […]
While Visser Precision is widely known for their work in cybersecurity defense, in 2020, they faced a menacing cyberattack of their own. The well-known space and defense manufacturer was hit by DoppelPaymer ransomware, a type […]
The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future. CISA’s new logo officially […]
There has been an increase in the percentage of systems attacked in the oil and gas industry as well as the building automation sector during the COVID-19 pandemic.
Phishing assaults are becoming increasingly targeted, and the COVID-19 pandemic is one of many ways hackers are exploiting people and small companies.
Because of the coronavirus pandemic, more people are working remotely to avoid getting sick. Consider these five tips to make sure your cyber hygiene is as strong as your physical hygiene.
Madison Horn discusses the move to proactive cybersecurity, the value of the shared responsibility model and the rise of quantum computing.
Steve Stone talked about how accessible cheap data storage and analytics have become and why breaches are inevitable.
A former hacker asks “What is the worst a hacker could do,?” and discusses how has generative AI changed the equation.
Dr. Jesus Molina talks about threats to critical infrastructure, cyber-informed engineering and how AI is more beneficial to attackers.
Cybersecurity insights Increasing connectivity and complexity in operational technology systems pose growing cybersecurity challenges for critical infrastructure. While AI offers potential benefits, both defenders and attackers are leveraging its capabilities, highlighting the need for vigilant […]
Five subtle yet pressing threats and the holistic measures you can employ to help fortify your cybersecurity posture.
Lesley Carhart discusses how to make hackers lives more difficult and why it’s essential to prepare for a cyber incident before it happens.
Mike Nelson, of CyberCX, talks about how to avoid cyber scams and why cybersecurity risk is really a business risk.
Supply and demand issues during the pandemic revealed how fragile supply chains can be, particularly with the increased threat of cyberattacks.
When it comes to the modern cybersecurity landscape, no one is secure, no matter how large or small a company is. Even if a company puts tremendous resources into securing its systems, hackers will likely […]
Sonar is a new AI-enabled browser extension designed to help detect phishing emails and enhance cybersecurity
The top 5 articles from August 2023 covered how to build an effective cyber strategy and the government impact on OT cyber risk.
Lesley Carhart talks about working in incident response, a power plant that turned on by itself and the maturity journey of OT cybersecurity.
Biometric data is a valuable target for cybercriminals, and hacking of this type of data is becoming a popular manner of identity theft.
ICS Pulse talked to Dr. Jesus Molina about the physical consequences of cyberattacks and what it means for your industrial environment.
Debbie Gordon, of Cloud Range, discusses the dangers of human vulnerabilities and why cyber practitioners need to have more than just skills.
Water and wastewater is critical to national security, economic stability and public health. Here’s how to protect it from cyber threat.
Thomas Pace discusses the prevalence of ransomware, the danger of supply chain attacks and how SBOMs can help secure systems.
Bot attacks on industrial control systems are becoming a focal point, as they are capable of causing harm to critical infrastructure.
In 2022, Canada’s SickKids hospital was hit by LockBit ransomware, which impacted its internal systems, phone lines and website.
Thomas Pace of Netrise discusses his background, what the government does well versus private industry and vulnerability management.
HSE has been described as one of the most significant digital assaults on a health care system in recent memory.
As nation-state attacks continue to rise, the energy sector must continue to security its assets from threat actors.
In 2012, the OilRig cyber espionage group began targeting the oil and gas industry and other critical infrastructure in the Middle East.
The Claroty Platform extracts critical data by monitoring all network communication, establishing a high-fidelity baseline model for rapid detection of anomalous behavior. Combining native OT knowledge with advanced models and algorithms, Claroty produces context-rich alerts […]
The top 5 from April 2023 covered the Biden administration’s National Cyber Strategy, cyber simulation training and the risks of connectivity.
From the first day of the 2023 RSA Conference, it was clear that the cybersecurity risks of ChatGPT would be a popular topic.
Annual phishing report highlights new phishing campaigns resulting from the rise of AI platforms urges organizations to adopt a zero trust.
The Davis-Besse nuclear plant fell victim to the Slammer worm, showing the consequences of cyberattacks on nuclear facilities.
The ICS Pulse Podcast talked to Ben Miller of Dragos about the Year in Review report and other cybersecurity trends in the industry.
To realize maximum value in industrial environments, seamless and transparent connectivity is needed from the plant floor to the cloud.
The first recorded phishing cyberattack took place in the mid-1990s and was carried out by a group of hackers who targeted America Online (AOL) users.
Xenotime, the Russian threat group responsible for the TRISIS attack in Saudi Arabia, probed the U.S. power grid.
The AW North Carolina cyberattack was an excellent example of why just-in-time manufacturing and ransomware can be a toxic mix.
Five key predictions, pulled from a range of cybersecurity analysts and experts, that are expected to emerge as 2023 progresses.
Ritesh Agrawal of Airgap Networks talks about protecting critical infrastructure and the value of zero trust in complex OT networks.
In 2014, Korea Hydro and Nuclear Power in South Korea suffered a cybersecurity incident that was blamed on their neighbors to the north.
CISA assesses that the United States and European nations may experience disruptive attacks against websites because of the invasion of Ukraine.
A recent data study on cybersecurity risk looked at which U.S. states had suffered the most data breaches in 2022.
A Dole cyberattack caused the food giant to temporarily shut down production plants in North America and halt shipments to grocery stores.
The RSA SecurID attack was a wake-up call about the vulnerability of two-factor authentication and the importance of the supply chain.
The first PC, MS-DOS virus, the Brain virus, jumped its way from computer to computer – via floppy disk, no less – back in 1986.
Today, CISA and the FBI released a joint Cybersecurity Advisory, ESXiArgs Ransomware Virtual Machine Recovery Guidance.
At a Dragos event, CEO Robert M. Lee discussed the evolution of critical infrastructure cybersecurity, breaking it down into four key eras.
Insider attacks are on the rise, and they can be even more dangerous because they know where an organization’s sensitive data lives.
Foxconn, although a massive company, was targeted by two different ransomware groups within a few years of each other.
The top 10 Throwback Attack articles of 2022 range from a Florida teenager hacking into NASA to a mistaken attack on a tiny New York dam.
Operation Aurora was a cyberattack on dozens of high-tech, security and defense companies that helped solidify the new era of cyber threat.
How can the utilities sector mitigate cybersecurity threats to ensure commercial operations are not compromised?
Threat actors impact two U.S. satellites, in a critical infrastructure attack that could have knocked them out of orbit.
A UN report warns that people’s digital rights to privacy are coming under greater pressure from the use of networked digital technologies.
In 2008, the United States DoD was infected with malware, giving rise to a defensive program called Operation Buckshot Yankee.
In 2016, waves of Operation Ghoul cyberattacks struck industrial, engineering and manufacturing organizations in more than 30 countries.
Critical infrastructures have faced many cyber threats, and the next attack could be around the corner because of the vulnerabilities.
How can you guard against supply chain attacks, what are the lessons to be learned and who should be in charge of supply chain security?
Dynamite Panda stole 4.5 million patient records from Community Health Systems, one of the largest hospital operators in the U.S.
In 2007, Red October, a high-level cyber espionage campaign, targeted embassies, research facilities, nuclear, aerospace, and oil and gas.
The supply chain is vulnerable both upstream and downstream. Here’s how can companies can better defend against supply chain attacks.
An Air Force base in Nevada fell victim to a malware attack that used keylogging to gain access to drone systems.
With supply chain attacks, you can have excellent cybersecurity, but if you’re working with vendors that don’t, you’re still at risk.
A report detailed a sustained campaign focused on exploiting networking devices across critical infrastructure
MuddyWater targets a wide range of organizations, including telecommunications, defense, local government, and oil and natural gas sectors.
Supply chain attacks insights Traditional cyberattacks are a one-to-one relationship between adversary and target. With the supply chain, it becomes a force multiplier because a single attack can be the access point to multiple targets. […]
A tabletop exercise can help companies achieve digital safety and peace of mind that their industrial manufacturing equipment is protected.
Back in 2015, a cyberattack hit LOT Polish Airways, grounding aircraft and stranding thousands of passengers at Poland’s busiest airport.
Limestone’s sewage treatment facility fell victim to a ransomware attack and proved that all businesses need cybersecurity best practices.
Suzanne Gill investigates the network security threats currently facing the operational technology (OT) environment today.
Cybersecurity revenue is up, as security has emerged as a top priority for organizations and consumers alike.
Advanced persistent threats (APTs), such as Holmium, can stay hidden for years without discovery, all while collecting private information from companies.
Cybersecurity revenues in the insurance sector are set to grow at a compound annual rate of more than 10%, from $6.4 billion in 2020 to $10.6 billion in 2025.
Four years after Shamoon’s initial cyberattack, security experts discovered evidence of a new malware, Shamoon 2, targeting organizations in Saudi Arabia.
In 2014, the White House experienced a cyberattack on its network, which could have risked classified information and critical infrastructure.
Senior Analyst Fernando Montenegro spoke on the evolution of ransomware at Black Hat 25 in Las Vegas, Nevada.
Black Hat 25: A team from IBM set out to create a more effective, open, community-sourced threat hunting framework.
Bahrain’s national oil company was struck in 2019 with the Dustman malware; however, this attack didn’t have the same outcome as Colonial.
Cybersecurity Insights Hackers have many ways to exploit vulnerabilities in various types of technology. Staying ahead of potential vulnerabilities and preventing attacks poised researchers at USC to develop a new approach to identify security liabilities. […]
What are the immediate cybersecurity challenges, what is the future of cyber warfare and what should people be focused on to prevent attacks?
When Julian Gutmanis — a cyber first responder — discovered TRISIS malware at a petrochemical plant in Saudi Arabia, his blood ran cold, according to MIT Technology Review. TRISIS malware was first detected in 2017 […]
A recent cybersecurity advisory alert details the Top 15 Common OT Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited. There have been multiple other […]
In recent years, cybersecurity in critical infrastructure has been at the forefront of people’s minds. With attacks on the U.S.’s critical infrastructure, such as Colonial Pipeline, Kemuri Water Company and many more, cybersecurity threats aren’t […]
Industroyer, or Crashoverride, is the first of many cybersecurity threats that is designed solely to attack power and electrical grids. It is also one of four cybersecurity threats found thus far that targets Industrial Control […]
Attacks on critical infrastructure increased by 3,900% from 2013 to 2020 (Gartner), and 55% of OT security practitioners rate ransomware as the #1 threat to OT systems (SANS), which is double the percentage from 2019. Why? […]
Critical infrastructure has always been a major target of threat actors around the world. For some, they strive to hit society at its most critical points (energy grids, water facilities, etc.). Some adversaries do it […]
In 1989, the first known ransomware attack occurred; 33 years later we are still being faced with more varied and complex ransomware incursions. Over the years, threat actors have found innovative ways to exploit vulnerabilities […]
The media focuses most of its attention on information security threats that originate outside of an organization. Whether it is the discovery of a new advanced persistent threat (APT) or a company breach, generally one […]
One of the most complex threats ever founded, according to Kaspersky Labs, Flame malware targeted Iran and other Middle Eastern countries with a cyber-espionage attack that researchers had little precedent for. Given the intricacies and […]
In 2014, a Siemens building in Monroeville, Pennsylvania, began to experience unusual crashes in their custom automated spreadsheets. Little did they know that this would be the first of many crashes in the two years […]
Every insidious and pervasive menace plaguing society has to begin somewhere. As more and more devices are connected to networks and information is shunted to the cloud, industrial cyberattacks continue to rise. Sophos’ recent State […]
Ransomware attacks have plagued the cybersecurity industry for years, and they’re coming at an increasing rate. In late April, Sophos, a software security company, released data and analysis from a survey on the state of […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) put out a Shields Up advisory in conjunction with Russia’s invasion of Ukraine. It’s probably necessary, as they would have been disparaged if they didn’t, and not […]
It has been one-year since the high-profile ransomware attack on energy pipeline operator Colonial Pipeline, which led to widespread fuel shortages along the East Coast. Add to that the later news that the U.S. Department […]
In today’s world, having cyberliteracy is crucial to protecting yourself from a cyberattack. Threat actors have the ability to hack virtually any device. With the right information, almost anything is vulnerable to them, from passwords […]
Ransomware has taken the world by storm, and informational technology (IT) is not the only technology affected. Operational technology (OT), which is increasingly blending with IT, is also susceptible to ransomware tactics, techniques and procedures […]
Since Russia made its initial incursion into Ukraine, the world has been wondering where the superpower will strike next. However, the next strike likely won’t be a physical attack, but rather will occur in the […]
As an organization’s security awareness grows, it’s important to know what cybersecurity tactics to communicate to the workforce during these unprecedented times. As security professionals, it is important to keep the communications calm, simple and […]
In parallel to the global COVID-19 pandemic, there has been a growing ransomware pandemic. Researchers discovered that ransomware attacks on U.S. organizations tripled in 2021 compared to 2020 and attacks on U.K. organizations doubled. This […]
President Biden recently spoke out about cybersecurity concerns, demonstrating that the world is on high alert for impending threats. It has been a national priority to strengthen cybersecurity for the past year, especially due to […]
It was June 1, 1990, and KIIS-FM was running a competition for callers to win a new Porsche 944 S2. All they had to do was be caller No. 102. However, not everyone who tried […]
On March 24, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI) and Department of Energy (DOE) released a joint Cybersecurity Advisory (CSA) providing information on previous Russian cyberattack campaigns spanning from […]
Homomorphic encryption is considered a next generation data security technology; but researchers have identified a vulnerability that allows hackers to steal data—even as it is being encrypted. “We weren’t able to crack homomorphic encryption using […]
As Russia’s assault on Ukraine worsened last week, fears about global cybersecurity — especially the cyber safety of critical infrastructure — continued to escalate. Russia has been aggressive with cyberattacks in the past, including taking […]
In the past decade, we have seen an alarming increase in attacks on critical energy infrastructure, with cyber incidents occurring across any number of geographies and industries. Common attacks can involve ransomware on a corporation’s […]
Sometimes the gap between the unveiling of a life-altering new technology and the corruption of that technology is exceedingly small. Take, for example, wireless technology, a potent attack vector in modern times. It’s also something […]
In parallel to the global COVID-19 pandemic, there has been a growing ransomware pandemic. Darktrace researchers discovered that ransomware attacks on U.S. organizations tripled in 2021 compared to 2020, and attacks on U.K. organizations doubled. […]
In 2010, Stuxnet, one of the biggest industrial cybersecurity attacks in history, was discovered as it struck the Natanz nuclear facility in Iran. This would not be the last problem for Iran’s nuclear program, however. […]
In 2006, headlines showed that Google bought YouTube for $1.65 billion in stock, Nintendo released the Wii gaming console and NASA launched the New Horizons probe. However, many people weren’t aware of a major cybersecurity […]
If 2021 was the year of ransomware, 2022 may become the year of software supply chain attacks. The prevalence of supply chain attacks has skyrocketed, with several high-profile strikes such as SolarWinds and Kaseya making headlines. […]
In 2020, the financial services sector was the industry that experienced the most cyberattacks. For years, attackers went after these organizations because they were expectedly lucrative targets. But in 2021, the financial services sector was […]
Disruptions to the food, beverage and agriculture sectors can cause more than just spikes in prices and production delays. They can also be a threat to public safety, precipitating the sale of tainted food, financial […]
As people around the world reflect on this past year and look forward to the next, it is important to learn from past mistakes so as to not repeat them. Six years ago, Dragonfly 2.0, […]
As more and more people head back into the office, public transportation is becoming normalized again. However, a customer has to keep track of route schedules, tickets and everything else they need to lug with […]
It took only nine months for 2021 to bypass 2020 in publicly reported data breaches. By the end of September, the total number of publicly reported breaches in 2020 was already exceeded by 17%, according […]
In the throes of a military action, everything is heightened. In February 1998, the U.S. and President Bill Clinton were preparing to bomb Iraq, as the country’s then-President Sadaam Hussein refused to comply with United […]
People have come to rely on electricity, and once someone has it, it’s hard to let it go. As winter rapidly approaches, it is easy to understand why. Without electricity, there are no appliances, lights […]
Checking tracking notifications from transportation companies has become second nature for anyone who has ordered something online. Many can’t wait to see that notification saying that their package has been delivered. Imagine the surprise and […]
Back in December, Darktrace predicted that supply chain attacks would overtake CEO fraud as a top cybersecurity concern. This year, the importance of supply chains has been brought to the forefront by a series of disruptions hitting […]
When people think of ransomware, they often picture a screen blinking with an ominous skull and crossbones image, indicating that something bad is happening. In fact, search for any ransomware attack, and there’s about a […]
The challenge of reliably attributing cyber threats has amplified in recent years, as cyber criminals have adopted a collection of techniques to ensure that even if their attacks are caught, they themselves escape detection and […]
In 2017, one of the most widespread and devastating cyberattacks was perpetrated against worldwide shipping giant Maersk. It started on a quiet afternoon in June, when staffers began seeing messages advising them that their file […]
In 1988, a Harvard graduate began an experiment to see how many computers were connected to the Internet. Twenty-four hours later, 10% of all computers around the world had been taken down, and the damages […]
Ransomware has been making headlines for the last few years for the impact it’s having on businesses and government entities. The increasing prevalence of these attacks has been a wake-up call to industries around the […]
The overwhelming majority of recent cyberattacks — at least the highly publicized ones — have been primarily about one thing: money. Colonial Pipeline, SolarWinds, JBS Foods, Kia Motors, Kaseya, the Washington D.C. Police Department and […]
The SolarWinds attack impacted more than 100 companies and federal agencies, according to U.S. government estimates. The ransomware strike on software provider Kaseya reportedly affected more than 1,500 companies — 60 or so direct customers […]
Most people would be happy to open their computer to see a love letter; however, starting on May 4, 2000, the terms “love letter” and “Love Bug” took on a whole new meaning. Windows users […]
The internet was still primitive in 1988. The entire network consisted of about 60,000 people, and was mostly limited to universities, research facilities and government offices. The World Wide Web, as we know it, was […]
As Labor Day arrives once again this year, it is a great time to talk about a ransomware attack that also happened on Labor Day — the attack on the Teamsters Union in 2019. This […]
Darktrace regularly observes an increase in cyberattacks, including ransomware, carried out during holidays, weekends and outside of working hours. It is clear that such “off-peak” attacks allow easy exploitation of standard organizational practices and human […]
Cybercriminals use a broad range of malicious tactics to exploit unsuspecting victims. However, some of their methods prove to be more effective than others. According to the data presented by the Atlas VPN team, social […]
There is seldom anything good that comes from ransomware attacks, but at least San Francisco mass transit users got a few free rides during a busy Thanksgiving weekend. In November 2016, threat actors went after […]
“All war is based on deception.” — Sun Wu Tzu, “The Art of War” Influencing the Vietcong, Chairman Mao and the KGB, Sun Tzu has had a profound impact on military strategy around the world. […]
It’s more a question of when than if when it comes to ransomware. If corporations and government entities don’t allocate resources to hardening cyber defenses, these seemingly inevitable attacks can be very costly. The city […]
Some of the key provisions of the American Jobs Plan that support critical infrastructure cybersecurity include: Make $20 billion in energy infrastructure investments for state, local and tribal governments contingent on cyber modernization Create a new tax […]
Distributed network protocol 3.0 (DNP3) is the second most-widely used serial communications protocol in industrial control systems (ICS), after Modbus. As EPRI (Electric Power Research Institute) mentioned in a 2019 technical update: “it is the […]
To anyone working in cybersecurity, it is not news that just about every critical infrastructure industry is significantly behind on their path toward cybersecurity maturity. There continues to be a fundamental friction between the estimation […]
While Visser Precision is widely known for their work in cybersecurity defense, in 2020, they faced a menacing cyberattack of their own. The well-known space and defense manufacturer was hit by DoppelPaymer ransomware, a type […]
The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future. CISA’s new logo officially […]
There has been an increase in the percentage of systems attacked in the oil and gas industry as well as the building automation sector during the COVID-19 pandemic.
Phishing assaults are becoming increasingly targeted, and the COVID-19 pandemic is one of many ways hackers are exploiting people and small companies.
Because of the coronavirus pandemic, more people are working remotely to avoid getting sick. Consider these five tips to make sure your cyber hygiene is as strong as your physical hygiene.
Keep your finger on the pulse of top industry news
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.