March 14, 2024
Via: The Hacker NewsThe threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader to deliver remote access trojans (RATs) like Remcos RAT and NjRAT. The attacks, which take the form of phishing emails, targeted Spanish-speaking users […]
Threats & Malware, Virus & Malware
December 19, 2022
Via: The Hacker NewsA Rust variant of a ransomware strain known as Agenda has been observed in the wild, making it the latest malware to adopt the cross-platform programming language after BlackCat, Hive, Luna, and RansomExx. Agenda, attributed to an operator named Qilin, […]
November 13, 2019
Via: Threat PostMore often than not, when then the internet of things (IoT) is brought up these days, it conjures images of Alexa, Siri and Cortana. These personal assistants can help users turn on a smart light bulb, flick on the oven […]
April 15, 2019
Via: Help Net SecurityAlmost three quarters of the 650+ international IT professionals Gurucul canvassed said they are vulnerable to insider threats, and ranked user error (39%) and malicious insiders (35%) ahead of account compromise (26%) as their leading concern. Small enterprises reported being […]
Data loss, Network security, Vulnerabilities
July 24, 2018
Via: Security WeekA publicly accessible server belonging to robotics vendor Level One Robotics and Controls, Inc. contained sensitive documents connected to more than one hundred manufacturing companies. Established in 2000, the engineering service provider offers automation process and assembly for OEM’s, Tier […]
October 10, 2017
Via: Threat PostAttackers spreading new malware called FormBook are singling out aerospace firms, defense contractors and some manufacturing organizations in the United States and South Korea. According to researchers at FireEye, FormBook was spotted in several high-volume distribution campaigns targeting the U.S. […]
November 18, 2016
Via: Hot for SecuritySecurity researchers have regularly expressed concern across industries that manufacturers are particularly vulnerable to cyber threats, and now a study finally backs them up. After interviewing 35 manufacturing executives and analyzing 225 survey responses from industry executives, Deloitte discovered that […]
October 24, 2016
Via: Panda SecurityHow can you prevent a manufacturing sabotage from becoming an IT disaster? Securing your company’s network with the right protection measures isn’t always enough. Of course you should install an adequate protection system and ensure that your employees use robust passwords. However, […]
January 18, 2016
Via: The HillThe Department of Homeland Security investigated almost twice as many cyberattacks on the nation’s critical manufacturing sector in fiscal year 2015 as the year before, according to a new government report. Critical manufacturing includes automakers, aviation equipment manufacturers and producers […]
September 15, 2015
Via: wireless-securityWhile traditional #manufacturing industries were not designed with security in mind, the proliferation of networks and devices, disparate communication channels, and the use of off-the-shelf software have thrust cyber-security into the spotlight. #safety and security concerns associated with the high […]
April 17, 2024