BeyondTrust has focused on locking down the infrastructure that privileged users access to improve their security posture and lower administrative overhead, said CEO Janine Seebeck. The identity vendor has helped privileged users access MSP customer environments without complicated firewall rules.
Modern construction techniques are employing a wide range of smart devices to control the environment, facilitate communications and save money. Virtually Informed CTO Sarb Sembhi shared a new report on IoT security for smart buildings with advice on complying with current and upcoming regulations.
The Biden administration on Tuesday initiated a nationwide cybersecurity certification and labeling program aimed at helping consumers choose smart devices that offer enhanced protection against hacking risks. Products will have a QR code and follow NIST standards.
China poses a growing threat to U.S. electric infrastructure and could potentially disrupt the power grid, gas and pipeline systems by exploiting compromised equipment and harnessing emerging artificial intelligence technologies for cyberattacks, experts told Congress on Tuesday.
While IT-OT convergence is accelerating, awareness and maturity of OT technologies still have a long road ahead. In this transition, organizations need to ensure the safety and health of workers is always the top priority for OT security, said Andre Shori, CISO, APAC with Schneider Electric.
Federal regulators and medical device maker Becton, Dickinson and Co. are warning about eight vulnerabilities that could allow an attacker to compromise BD's medication infusion product suite, potentially putting data and device integrity at risk if exploited.
The Washington Post recently highlighted contracts between the Russian Company NTC Vulkan and the Russian Ministry of Defense. This public intelligence brief outlines the threats to critical infrastructure described in those documents. The Russian cyber program Amesit is a broad and wide-ranging program executed over...
OT defenders may be experienced in the preparation for and response to industrial incidents such as fire, loss of containment, and other hazardous situations that can arise in industrial facilities. However, few OT defenders have the same level of training and experience in cybersecurity incident response in...
Rockwell Automation teamed-up with CISA to find two critical flaws that require immediate attention, citing a novel exploit capability attributed to advanced persistent threat actors known for targeting industrial systems and critical infrastructure.
Honeywell plans to purchase an OT security vendor founded by Israel Defense Forces veterans to deliver asset discovery, threat detection and compliance management to industrial organizations. The SCADAfence acquisition will allow Honeywell to offer an end-to-end enterprise OT cybersecurity platform.
This week, Charming Kitten targeted nuclear experts; over 130,000 solar energy monitoring systems are exposed; organizations confirmed a breach due to the MOVEit zero-day; Russian hackers took over a Ukrainian government agency's Facebook page; and a WordPress plug-in gave admin privileges to users.
Hackers use generative AI to churn out code that exploits vulnerabilities, while defenders use it to get more context around flaws discovered in their ecosystem, said CEO Amit Yoran. Tenable uses generative AI to spot and prioritize all the instances of MOVEit in a customer's environment.
Ransomware believed to originate from the Russian LockBit 3.0 group locked up computer systems for the Port of Nagoya, Japan's largest cargo hub. The attack held up shipments of Toyota auto parts containers for two days, but the port reopened Thursday morning.
Critical services in the Netherlands could be a potential target of ransomware and hacktivist attackers with ties to Russia as a means to sow large-scale disruptions in the country, according to a Dutch National Cyber Security Center warning this week.
The United States is further fortifying its critical infrastructure security with a new Cybersecurity and Infrastructure Security Agency program that enhances the cyber resilience of participating partners leveraging the agency's advanced threat detection and monitoring capabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.