17.2 C
Johannesburg

Solar, Wind Power Utility Disrupted in Rare Cyberattack

A simple attack on an unpatched server could have been catastrophic for the Utah-based utility. Read more

ICS Attackers Set To Inflict More Damage With Evolving Tactics

While it remains difficult to attack critical infrastructure successfully, adversaries aim to use past experience to launch more destructive future attacks, according to analysis. Read more

Pwn2Own Expands Into Industrial Control Systems Hacking

White-hat hackers will now have the chance to win $20,000 for sniffing out remote code-execution flaws in industrial control systems. Read more

Cynet’s free vulnerability assessment offering helps organizations significantly increase their security

By monitoring their environment, companies can be ready to take action if any weakness – usually a software vulnerability – is found. Read more

Microsoft Tackles Election Security with Bug Bounties

Researchers can earn up to $15,000, depending on the severity of the bug found. Read more

Major Airport Malware Attack Shines a Light on OT Security

A cryptomining infection spread to half of the workstations at a major international airport. Read more

AA19-290A: Microsoft Ending Support for Windows 7 and Windows Server 2008 R2

Original release date: October 17, 2019 | Last revised: October 18, 2019SummaryNote: This alert does not apply to federally certified voting systems running Windows 7. Microsoft will continue to...

New Presentation Template: Incident Response Reporting for Management

For many security decision-makers, the real challenge is communicating the ongoing IR process to their management. Read more

On-Board ‘Mystery Boxes’ Threaten Global Shipping Vessels

Unknown, vulnerable systems are present in nearly every ship environment that researchers have pen-tested. Read more

Software, Supply-Chain Dangers Top List of 5G Cyber Risks

Without naming Huawei, the EU warns on state-backed 5G suppliers. Read more

Latest article

Two men busted for hijacking victims’ phones and email accounts

Prosecutors allege that Meiggs and Harrington took over their targets' mobile phone and email accounts via SIM-swapping. Read more

Leaked Russian Interference Report Raises Questions About Brexit, UK Election Security

A report from the U.K. Parliament's intelligence committee concludes that "Russian interference may have had an impact on the Brexit referendum," reports the Times...

Lessons From the Cyberattack On India’s Largest Nuclear Power Plant

Dan Drollette shares an article by two staffers at the Center for Global Security Research at Lawrence Livermore National Laboratory from The Bulletin of...