fbpx

‘Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings. There was nothing typical this year at BSides LV, Black Hat USA and DEF CON – also known collectively as Hacker Summer Camp. The weeklong collection of cybersecurity conferences featured an eclectic mix of attendees to learn, network, hack and […]

Read more

The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities. <div class=”c-article__content js-reading-content”> Zeppelin ransomware is back and employing new compromise and encryption tactics in its recent campaigns against various vertical industries—particularly healthcare—as well as critical infrastructure organizations, the feds are warning. […]

Read more

Iran’s steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country’s rail system. <div class=”c-article__content js-reading-content”> Malware used in a crippling cyberattacks against an Iranian steel plants last week is connected to an attack that shut down the country’s rail system last year. In both cases, on malware strain was used to […]

Read more

2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and how organizations and their employees are the reasons why incidents occur. <div class=”c-article__content js-reading-content”> Ransomware, supply-chain threats and how organizations and their employees are their own worst enemy when it comes to security are some of the key takeaways of Verizon’s annual report on […]

Read more

Fortinet’s Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where botnets and offensive automation fit in, and the ramifications for security teams. <div class=”c-article__content js-reading-content”> Cyber-defenders have a lot on their plates: Rapid vulnerability exploitation. Ransomware-apalooza. Botnet infestations on the order never seen in the past. How can IT […]

Read more

Threat actors have developed custom modules to compromise various ICS devices as well as Windows workstations that pose an imminent threat, particularly to energy providers. <div class=”c-article__content js-reading-content”> Threat actors have built and are ready to deploy tools that can take over a number of widely used industrial control system (ICS) devices, which spells trouble […]

Read more

The supply-chain attack on the U.S. energy sector targeted thousands of computers at hundreds of organizations, including at least one nuclear power plant. <div class=”c-article__content js-reading-content”> The U.S. Department of Justice (DOJ) has <a href=”https://www.justice.gov/opa/pr/four-russian-government-employees-charged-two-historical-hacking-campaigns-targeting-critical” target=”_blank” rel=”noopener”>indicted</a> four Russian government employees in connection to plots to cyber-fry critical infrastructure in the United States and beyond, […]

Read more

Protecting your computers and network from security events requires multi-level strategies, and you may use network level traffic filtration as you degree of defense. Users need usage of the web for business reasons, however they can download malware inadvertently, that may impact data and network security. This post describes how exactly to use custom Suricata […]

Read more