Rockwell Automation teamed-up with CISA to find two critical flaws that require immediate attention, citing a novel exploit capability attributed to advanced persistent threat actors known for targeting industrial systems and critical infrastructure.
Given the sustained onslaught of cyberattacks against the healthcare industry, organizations can help protect all enterprises simply by sharing advance information, said Steve Hunter, vice president of marketing and development at Health-ISAC. Ensuring anonymity helps users share more freely.
Honeywell plans to purchase an OT security vendor founded by Israel Defense Forces veterans to deliver asset discovery, threat detection and compliance management to industrial organizations. The SCADAfence acquisition will allow Honeywell to offer an end-to-end enterprise OT cybersecurity platform.
Federal regulators have issued a warning about a vulnerability in medical device maker Medtronic's Paceart Optima System which, if exploited, could lead to a denial-of-service or remote code execution affecting the system's cardiac device data.
Digital Nasional Berhad, which manages Malaysia's 5G network, follows five principles to ensure a cyber-resilient network. Baljit Dhillon shared how the organization focuses on secure design, zero trust, supply chains, detection and understanding the impact of a compromise.
Operational technologies straddle both IT and production systems, which means multiple people need to own OT security risk. Security programs must heavily involve engineers in OT security and assign different security roles across the enterprise, said AJ Eserjose, Regional Director of OT-ISAC.
A service selling DDoS disruptions via a Mirai-based botnet called Condi is the latest to target consumer-grade Wi-Fi routers made by TP-Link with firmware not yet patched to fix a known flaw. Unusually, a recently spotted sample of Condi has been stripped down to target only that flaw.
India's national cybersecurity coordinator said the government will soon roll out a cybersecurity reference framework to help organizations operating in critical infrastructure sectors shore up their defenses. The framework joins data protection and security strategy as a top government priority.
Moore Strategic Ventures led a $33 million investment into a military and transportation security startup founded by officers who stood up U.S. Army Cyber Command. The funds will help Shift5 expand from safeguarding military vehicles to protecting commercial modes of transportation.
Dragos has axed 50 workers after longer sales cycles and smaller initial deployment sizes caused the industrial cybersecurity vendor to miss its first quarter revenue target. Dragos revealed plans to reduce its staff by 9% to ensure the company can stay independent through an IPO or Series E round.
Healthcare providers are struggling with protecting legacy medical devices against a rising tide of cyberthreats. New Health Sector Coordinating Council guidance can help, said Jessica Wilkerson of the Food and Drug Administration and Mike Powers of Intermountain Health.
Ransomware attacks grew by 80% last year, according to Zscaler's ThreatLabz findings. Further, phishing attacks increased by 47%.
In the wake of recent high-profile data breaches in Australia, the global threat landscape is top of mind for everyone from Anthony Albanese to your next-door neighbors. The pressure is...
Risk management, operations, security - each organization and more play a role in ensuring OT security across the enterprise. Qiang Huang of Palo Alto Networks talks about new strategies to embrace and improve security of operational technology and connected devices.
With an ever-expanding threat landscape, organizations need to possess the right tools and knowledge to deal with cyberattacks. Dawn Cappelli, head of OT-CERT at Dragos, recommends training small and medium-sized businesses that are just starting their operation technology journey.
AI Trust Risk and Security Management - AI TRiSM - is a new Gartner research category, and distinguished analyst Avivah Litan is assigned to it. She discussed today's AI attack surface, including attacks that use AI as well as attacks against it and trends to watch in the second half of 2023.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.