Black Hat 25: The evolution of ransomware
Senior Analyst Fernando Montenegro spoke on the evolution of ransomware at Black Hat 25 in Las Vegas, Nevada.
Senior Analyst Fernando Montenegro spoke on the evolution of ransomware at Black Hat 25 in Las Vegas, Nevada.
Black Hat 25: A team from IBM set out to create a more effective, open, community-sourced threat hunting framework.
Bahrain’s national oil company was struck in 2019 with the Dustman malware; however, this attack didn’t have the same outcome as Colonial.
Cybersecurity Insights Hackers have many ways to exploit vulnerabilities in various types of technology. Staying ahead of potential vulnerabilities and preventing attacks poised researchers at USC to develop a new approach to identify security liabilities. […]
What are the immediate cybersecurity challenges, what is the future of cyber warfare and what should people be focused on to prevent attacks?
When Julian Gutmanis — a cyber first responder — discovered TRISIS malware at a petrochemical plant in Saudi Arabia, his blood ran cold, according to MIT Technology Review. TRISIS malware was first detected in 2017 […]
A recent cybersecurity advisory alert details the Top 15 Common OT Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited. There have been multiple other […]
In recent years, cybersecurity in critical infrastructure has been at the forefront of people’s minds. With attacks on the U.S.’s critical infrastructure, such as Colonial Pipeline, Kemuri Water Company and many more, cybersecurity threats aren’t […]
Industroyer, or Crashoverride, is the first of many cybersecurity threats that is designed solely to attack power and electrical grids. It is also one of four cybersecurity threats found thus far that targets Industrial Control […]
Attacks on critical infrastructure increased by 3,900% from 2013 to 2020 (Gartner), and 55% of OT security practitioners rate ransomware as the #1 threat to OT systems (SANS), which is double the percentage from 2019. Why? […]
Senior Analyst Fernando Montenegro spoke on the evolution of ransomware at Black Hat 25 in Las Vegas, Nevada.
Black Hat 25: A team from IBM set out to create a more effective, open, community-sourced threat hunting framework.
Bahrain’s national oil company was struck in 2019 with the Dustman malware; however, this attack didn’t have the same outcome as Colonial.
Cybersecurity Insights Hackers have many ways to exploit vulnerabilities in various types of technology. Staying ahead of potential vulnerabilities and preventing attacks poised researchers at USC to develop a new approach to identify security liabilities. […]
What are the immediate cybersecurity challenges, what is the future of cyber warfare and what should people be focused on to prevent attacks?
When Julian Gutmanis — a cyber first responder — discovered TRISIS malware at a petrochemical plant in Saudi Arabia, his blood ran cold, according to MIT Technology Review. TRISIS malware was first detected in 2017 […]
A recent cybersecurity advisory alert details the Top 15 Common OT Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited. There have been multiple other […]
In recent years, cybersecurity in critical infrastructure has been at the forefront of people’s minds. With attacks on the U.S.’s critical infrastructure, such as Colonial Pipeline, Kemuri Water Company and many more, cybersecurity threats aren’t […]
Industroyer, or Crashoverride, is the first of many cybersecurity threats that is designed solely to attack power and electrical grids. It is also one of four cybersecurity threats found thus far that targets Industrial Control […]
Attacks on critical infrastructure increased by 3,900% from 2013 to 2020 (Gartner), and 55% of OT security practitioners rate ransomware as the #1 threat to OT systems (SANS), which is double the percentage from 2019. Why? […]
Keep your finger on the pulse of top industry news
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.