The Cisco Cyber Threat Trends report examines malicious domains for trends and patterns. See what the data tells us about the threat landscape.
Read moreThe Cisco Cyber Threat Trends report examines malicious domains for trends and patterns. See what the data tells us about the threat landscape.
Read moreThe incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data. A U.K. water supplier suffered a disruption in its corporate IT systems Monday as a result of a cyber-attack but claims that its water supply was not affected. Meanwhile, the alleged […]
Read more‘Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings. There was nothing typical this year at BSides LV, Black Hat USA and DEF CON – also known collectively as Hacker Summer Camp. The weeklong collection of cybersecurity conferences featured an eclectic mix of attendees to learn, network, hack and […]
Read moreThe CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities. <div class=”c-article__content js-reading-content”> Zeppelin ransomware is back and employing new compromise and encryption tactics in its recent campaigns against various vertical industries—particularly healthcare—as well as critical infrastructure organizations, the feds are warning. […]
Read moreIran’s steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country’s rail system. <div class=”c-article__content js-reading-content”> Malware used in a crippling cyberattacks against an Iranian steel plants last week is connected to an attack that shut down the country’s rail system last year. In both cases, on malware strain was used to […]
Read more2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and how organizations and their employees are the reasons why incidents occur. <div class=”c-article__content js-reading-content”> Ransomware, supply-chain threats and how organizations and their employees are their own worst enemy when it comes to security are some of the key takeaways of Verizon’s annual report on […]
Read moreFortinet’s Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where botnets and offensive automation fit in, and the ramifications for security teams. <div class=”c-article__content js-reading-content”> Cyber-defenders have a lot on their plates: Rapid vulnerability exploitation. Ransomware-apalooza. Botnet infestations on the order never seen in the past. How can IT […]
Read moreThreat actors have developed custom modules to compromise various ICS devices as well as Windows workstations that pose an imminent threat, particularly to energy providers. <div class=”c-article__content js-reading-content”> Threat actors have built and are ready to deploy tools that can take over a number of widely used industrial control system (ICS) devices, which spells trouble […]
Read moreThe supply-chain attack on the U.S. energy sector targeted thousands of computers at hundreds of organizations, including at least one nuclear power plant. <div class=”c-article__content js-reading-content”> The U.S. Department of Justice (DOJ) has <a href=”https://www.justice.gov/opa/pr/four-russian-government-employees-charged-two-historical-hacking-campaigns-targeting-critical” target=”_blank” rel=”noopener”>indicted</a> four Russian government employees in connection to plots to cyber-fry critical infrastructure in the United States and beyond, […]
Read moreProtecting your computers and network from security events requires multi-level strategies, and you may use network level traffic filtration as you degree of defense. Users need usage of the web for business reasons, however they can download malware inadvertently, that may impact data and network security. This post describes how exactly to use custom Suricata […]
Read more
You must be logged in to post a comment.