This week: FBI warns of cyberthreats to U.S. renewable energy sector; Indonesia data center hacker apologizes; Google Pixel 6 series devices bricked, critical vulnerability in EoL D-Link routers, Google offers $250,000 reward for KVM vulnerabilities, NCA disrupts global Cobalt Strike supply chain.
Software maker for critical manufacturing organizations PTC patched a critical flaw that could allow hackers to execute arbitrary commands on a system server, days after the U.S. cybersecurity watchdog published a vulnerability advisory.
The U.S Supreme Court's decision to overturn a 40-year precedent known as the Chevron deference - which allowed federal cyber authorities to broadly interpret decades-old statutory authorities - will likely hinder digital security rule-making for generations to come, experts warn.
The Cybersecurity and Infrastructure Security Agency confirmed Monday that hackers attacked one of its critical tools housing private sector chemical security plans earlier this year after gaining access by exploiting vulnerabilities found in Ivanti products used by the cyber defense agency.
Critical infrastructure sectors face many potentially disruptive threats such as supply chain vulnerabilities and the growing dependency on space-based systems. But the top cyberthreats facing the U.S. are the People's Republic of China and emerging risks associated with AI and quantum computing.
Chemical companies have significantly boosted their cyber budgets over the past five years, according to a 2023 cyber survey published Monday, as awareness of cybersecurity vulnerabilities has steadily risen across the industry and new U.S. and E.U. regulations loom on the horizon.
Adi Bleih and Daniel Pigeon of Cyberint discuss the evolution of cyber operations in recent conflicts, the rise of hacktivist groups, the targeting of critical infrastructure and supply chains and the need for new defense strategies.
Healthcare organizations are particularly vulnerable to ransomware, risking significant data loss. Steve Stone, head of Rubrik's Zero Labs, outlines why healthcare faces higher risks and how organizations can strengthen their defenses against these disruptive threats.
To address the threat posed by advanced malware, enterprises are implementing specialized, resolute teams focused on the detection, analysis, and response to unknown cyber threats.
Considered the last line of defense to stop new malware threats, malware sandbox technology has evolved from an obscure research tool to...
Healthcare organizations are particularly vulnerable to ransomware, risking significant data loss. Steve Stone, head of Rubrik’s Zero Labs, outlines why healthcare faces higher risks and how organizations can strengthen their defenses against these disruptive threats.
Organizations often grapple with the question of whether relying solely on Microsoft for cybersecurity is enough. Kevin Robertson, chief operating officer and co-founder of Acumen, makes the case for including best in breed security technology and services from specialized vendors.
Pikabot has posed significant challenges to many Endpoint Detection and Response (EDR) systems through its employment of an advanced technique to hide its malicious activities known as “indirect system calls” (or “indirect syscalls”). This is only one of multiple techniques this family employs to evade...
Most OT environments deploy some level of defense in depth to provide protection or worst-case firefighting capability. Current state of the art endpoint protection solutions are necessary, but not sufficient to stop anything but the most basic threats. Bottom line: today’s solutions aren’t working against this...
Joseph Couture, regional information security officer for the Americas and CISO for the United States at Ørsted, discusses the unique regulatory challenges in the energy sector, the importance of risk management, and how Ørsted addresses cybersecurity to ensure safe and reliable energy delivery.
The onset of war between Israel and Hamas led to a spike in cyberattacks against operational technology, says Microsoft in a warning to critical infrastructure operators about the dangers of internet-exposed operational technology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.