Security News

Cyber espionage and sabotage attacks pose an increasing threat to the energy industry
2019-04-17 05:00

Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase vulnerabilities, and...

Manufacturing sector most vulnerable to insider threats
2019-04-15 05:53

Almost three quarters of the 650+ international IT professionals Gurucul canvassed said they are vulnerable to insider threats, and ranked user error (39%) and malicious insiders (35%) ahead of...

For a Winning Security Strategy, Redefine the Threat Landscape
2019-04-12 13:21

The NCAA Tournament ended just a few days ago and the pain or exuberance, depending on your bracket picks, is still fresh. As I watched hours of college basketball, I was struck by something the...

Hamas-Linked Threat Actor's Infrastructure Disrupted
2019-04-11 17:18

A large portion of the infrastructure related to a Middle Eastern threat actor known as Gaza Cybergang was taken down after their latest operations were uncovered, Kaspersky Lab’s security...

i3 Ops AI platform identifies social media threats in real time
2019-04-11 03:00

i3 Operations (i3 Ops) Artificial Intelligence Maintaining Safety (AIMS), an AI platform that unravels the chaos of social media in real time to identify threats has emerged from stealth mode. i3...

Closed loop automation combats IoT security threats in the 5G age
2019-04-10 05:45

The 5G race is on as carriers prepare for the onset of the next wireless generation in their own ways. While some have pseudo-definitions of 5G, others like Verizon and AT&T, are leading the 5G...

Shadow App Development: Insider Threat or Opportunity?
2019-04-09 15:39

The challenge for most enterprises is that the demand for software is so high that traditional development teams often can’t keep up.

SAS 2019: 4 Stuxnet-Related APTs Form Gossip Girl, an ‘Apex Threat Actor’
2019-04-09 12:06

Flowershop, Equation, Flame and Duqu appear to have a hand in the different phases of Stuxnet development, all working as part of an operation active as early as 2006.

The unique business-critical threats facing converged IT-OT systems
2019-04-08 04:45

Manufacturing networks still running outdated technology could risk their intellectual property and production processes. The Trend Micro report, Securing Smart Factories: Threats to Manufacturing...

Analysis: The Evolving Ransomware Threat
2019-04-05 10:33

The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's...