Tag Archives: Cyberwarfare

04Feb/22

80% of Critical Infrastructure Organizations Experienced Ransomware Attacks Last Year

Claroty, the security company for cyber-physical systems (CPS) across industrial, healthcare, and enterprise environments, today released a new report, revealing that 80% of critical infrastructure organizations experienced a ransomware attack in the last year, with an equal number reporting that their security budgets have risen since 2020. Titled “The Global State of Industrial Cybersecurity 2021: Resilience Amid Disruption,” the report is based on an independent global survey of 1,100 information technology (IT) and operational technology (OT) professionals who work in critical infrastructure sectors, exploring how they have dealt with the significant challenges in 2021, their levels of resiliency, and priorities moving forward. Continue reading

31Jan/22

Avast Q4/2021 Threat Report: Log4j opening doors for new attacks while ransomware and RAT attacks on decline

Avast (LSE:AVST), a global leader in digital security and privacy released its Q4/2021 threat report today, revealing an immediate exploitation of the Log4j vulnerability by coinminers, RATs, botnets, ransomware, and APTs, in December putting CISO departments under pressure. Furthermore, Avast’s threat researchers observed the revival of the Emotet botnet, and a 40% rise in coinminers, posing risks for consumers and businesses alike. The Q4 findings likewise show an increase in adware, technical support scams on desktop, and subscription scams and spyware on Android devices, targeting consumers. At the same time, Avast saw less ransomware and remote access trojan (RAT) activity. Continue reading

12Sep/21

53% of European companies blame cyberattacks on unknown assets

A new poll by MIT Technology Review Insights, in association with Palo Alto Networks, underscores the cybersecurity struggles countries in Europe, the Middle East, and Africa have with outdated software and tools. When the pandemic forced employers to support remote work, these infrastructure security shortfalls became all too apparent. Read more

02May/21

Coalfire Launches Risk-Based Attack Surface Management Solution

With its recent acquisition of Neuralys, a cloud-based penetration testing management platform, today Coalfire launched its Attack Surface Management (ASM) solution to enhance the company’s growing offensive security portfolio. ASM complements the company’s 20-year risk management heritage by automating asset discovery, testing, remediation, and reporting across today’s expanding attack surfaces. Continue reading

16Feb/21

Garry Kasparov at IMPROVATE Israel-UAE-Eastern Europe Cybersecurity spoke about Chess, Artificial intelligence, his role in the series The Queen’s Gambit

With the accelerated transition to remote work, cloud use, and the use of online payments, the number and cost of cyber-attacks on individuals, private companies and states has dramatically increased. The IMPROVATE Israel-UAE-Eastern Europe Cybersecurity Conference presented groundbreaking Israeli technologies in the field of cybersecurity, and also defense against circulation of fake news. Continue reading

12May/20

Cloud Computing, Cybersecurity and Programming Feature as ICT Training Trends During Lockdown

Technologies related to Cloud Computing, cyber security and website programming, together with artificial intelligence and Big Data, are the focus of training trends in ICT skills for professionals during the lockdown caused by COVID-19. Read more

22Mar/20

Essential Critical Infrastructure Workers During COVID-19 Response

Developed in collaboration with other federal agencies and the private sector, the Agency said its list of “Essential Critical Infrastructure Workers was designed to help State and local officials as they work to protect their communities, while ensuring continuity of functions critical to public health and safety, as well as economic and national security. Read more

28Sep/17

How hackers hack ATMs remotely

Japanese cybersecurity firm Trend Micro has published a white paper detailing how hackers can remotely control ATMS. Continue reading