What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Dragos.webp 2024-04-17 16:25:58 Paysage cyber-menace pour le secteur américain de l'eau et des eaux usées
OT Cyber Threat Landscape for the U.S. Water & Wastewater Sector
(lien direct)
> Dragos OT Cyber Threat Intelligence Les chasseurs et les analystes d'adversaire effectuent des recherches sur les opérations adversaires et leurs tactiques, techniques et procédures ... Le post OT Cyber Threat Landscape pour l'US Water &Le secteur des eaux usées est apparu pour la première fois sur dragos .
>Dragos OT Cyber Threat Intelligence adversary hunters and analysts conduct research on adversary operations and their tactics, techniques, and procedures... The post OT Cyber Threat Landscape for the U.S. Water & Wastewater Sector  first appeared on Dragos.
Threat Industrial ★★
IndustrialCyber.webp 2024-04-17 12:52:50 Hexagon et Dragos annoncent une alliance technique pour stimuler la cybersécurité industrielle, réduire le cyber-risque global
Hexagon and Dragos announce technical alliance to boost industrial cybersecurity, reduce overall OT cyber risk
(lien direct)
dragos et hexagon ont uni leurs forces pour fournir aux organisations industrielles une visibilité et un contexte complet de l'ICS / OT ...
Dragos and Hexagon have joined forces to provide industrial organizations with the comprehensive visibility and context of ICS/OT...
Industrial Technical ★★
IndustrialCyber.webp 2024-04-17 10:24:14 Acheteurs de la cybersécurité industrielle \\ 'Guide 2024 Navigue du paysage industriel complexe
Industrial Cybersecurity Buyers\\' Guide 2024 navigates complex industrial landscape
(lien direct)
> La sixième édition annuelle de la technologie de cybersécurité industrielle, des solutions et des acheteurs de services \\ 'Guide 2024 a été publié ...
>The sixth annual edition of the Industrial Cybersecurity Technology, Solutions, and Services Buyers\' Guide 2024 has been published...
Industrial ★★
IndustrialCyber.webp 2024-04-15 13:47:34 Kaspersky ICS CERT rapporte sur l'escalade des conséquences des cyberattaques contre les organisations industrielles
Kaspersky ICS CERT reports on escalating consequences of cyber attacks on industrial organizations
(lien direct)
Les nouvelles données publiées par les chercheurs de l'équipe Kaspersky ICS CERT fournissent des détails sur les attaques cybercriminales et hacktiviste ...
New data released by researchers from the Kaspersky ICS CERT team provides details on cybercriminal and hacktivist attacks...
Industrial ★★★★
SecurityWeek.webp 2024-04-15 12:51:28 Destructif ics malware \\ 'Fuxnet \\' utilisé par l'Ukraine contre l'infrastructure russe
Destructive ICS Malware \\'Fuxnet\\' Used by Ukraine Against Russian Infrastructure
(lien direct)
ics malware Fuxnet prétendument utilisé par le groupe de blackjack ukrainien pour perturber les capteurs industriels et autres systèmes appartenant à une entreprise d'infrastructure de Moscou.
ICS malware Fuxnet allegedly used by Ukrainian Blackjack group to disrupt industrial sensors and other systems belonging to a Moscow infrastructure firm.
Malware Industrial ★★★
ProofPoint.webp 2024-04-15 06:00:31 Comment la protection d'identification de la preuve peut vous aider à répondre aux exigences de conformité CMMC
How Proofpoint Impersonation Protection Can Help You Meet CMMC Compliance Requirements
(lien direct)
The Cybersecurity Maturity Model Certification (CMMC) program enforces the protection of sensitive unclassified information that the U.S. Department of Defense (DoD) shares with its contractors and subcontractors.   Threat actors know how to hijack your trusted organization communications. They can impersonate you, your brand or your organization partners. And they can make a nice profit doing it. The FBI\'s 2023 Internet Crime Report notes that last year\'s adjusted losses from organization email compromise (BEC) cases exceeded $2.9 billion-up 7.4% from 2022.  Bad actors use spoofed domains, lookalike domains, compromised supplier accounts and other tactics in their attacks. So it\'s important to keep communications with trusted partners, customers and suppliers safe. This should be a top focus for government agencies and the organizations that they work with since they are key targets for bad actors.  Proofpoint helps you mitigate the risk of impersonation abuse with a holistic, multilayered approach. With Proofpoint Impersonation Protection, you can:  Protect your organization\'s communications from impersonation threats  Stop attackers from impersonating your brand  Detect and defend against risky suppliers, including compromised supplier accounts  Secure user and application emails so that they can be trusted  We help our federal and defense industrial base customers with Level 3 CMMC controls around the Risk Assessment (RA) and Identification and Authentication (IA) Practices. Here\'s how.  CMMC overviews for Level 3 controls   In this section, we match CMMC compliance requirements with the capabilities of Proofpoint Impersonation Protection.   CMMC Level 3 – Risk Assessment Practice   RA.L3-3.11.1e – Threat-Informed Risk Assessment  CMMC compliance requirement  Employ threat intelligence, at a minimum from open or commercial sources, and any DoD-provided sources, as part of a risk assessment to guide and inform the development of organizational systems, security architectures, selection of security solutions, monitoring, threat hunting and response and recovery activities.  RA.L3-3.11.3e – Advanced Risk Identification  CMMC compliance requirement  Employ advanced automation and analytics capabilities in support of analysts to predict and identify risks to organizations, systems and system components.  RA.L3-3.11.6e – Supply Chain Risk Response  CMMC compliance requirement  Assess, respond to and monitor supply chain risks associated with organizational systems and system components.  RA.L3-3.11.7e – Supply Chain Risk Plan  CMMC compliance requirement  Develop a plan for managing supply chain risks associated with organizational systems and system components; update the plan at least annually, and upon receipt of relevant cyber threat information, or in response to a relevant cyber incident.  How Proofpoint Impersonation Protection meets the Risk Assessment (RA) Practice needs above  Proofpoint Nexus Supplier Risk Explorer gives you insights into supplier risk. This includes threats where attackers are impersonating your agency as well as compromised suppliers and third parties.   Supplier Risk can also be used as part of a vendor risk management process when sourcing and choosing new vendors/suppliers. Proofpoint provides visibility into supply chain threats, lookalike detection, and impersonations of your brand with Supplier Risk and Domain Discover. This helps to create the supply chain risk plans that are needed to comply with CMMC.  Supplier Risk Explorer identifies supplier domains and shows you which suppliers pose a risk to your organization.  As noted above, Supplier Risk Explorer assesses the risk level of supplier domains by evaluating several dimensions, including:   Threats sent to your organization  Threats sent to other Proofpoint customers  The lookalikes of supplier domains  Whether a domain was recently registered  Whether a domain has a DMARC reject policy   By ranking an Threat Industrial Prediction Commercial ★★
IndustrialCyber.webp 2024-04-14 08:49:09 Besoin continu pour faire face à des défis, élaborer des stratégies à travers la cybersécurité industrielle au milieu des menaces en évolution
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
(lien direct)
Les cyber-menaces et les attaques croissantes contre les installations d'infrastructures critiques ont conduit à l'adaptation constante du changement ...
Rising cyber threats and attacks against critical infrastructure installations have led to the constant adaptation of the changing...
Industrial ★★
IndustrialCyber.webp 2024-04-10 16:44:18 Salvador assure les investissements de Deutsche Telekom pour étendre la plate-forme de récupération de cyber-attaque
Salvador secures investment from Deutsche Telekom to expand cyber-attack recovery platform
(lien direct)
> La société de récupération des données OT / ICS Salvador Technologies a obtenu un investissement de Deutsche Telekom.Le financement sera utilisé ...
>OT/ICS data recovery firm Salvador Technologies has secured an investment from Deutsche Telekom. The funding will be used...
Industrial ★★
IndustrialCyber.webp 2024-04-10 16:43:28 Securitygate annonce la disponibilité générale du flux de travail ISA / IEC 62443-2-1 dans sa plate-forme
SecurityGate announces general availability of ISA/IEC 62443-2-1 workflow in its platform
(lien direct)
> Securitygate Inc., un fournisseur de plate-forme SaaS pour l'OT / ICS Cyber Improvement, a annoncé mardi qu'il avait ajouté ISA / IEC 62443-2-1 ...
>SecurityGate Inc., a SaaS platform provider for OT/ICS cyber improvement, announced Tuesday that it has added ISA/IEC 62443-2-1...
Industrial Cloud ★★★
Dragos.webp 2024-04-10 13:00:00 The Hunt: détecter l'activité du groupe de menaces de voltzite dans les infrastructures critiques
The Hunt: Detecting VOLTZITE Threat Group Activity in Critical Infrastructure
(lien direct)
> Bienvenue à & # 8220; The Hunt, & # 8221;Notre série de blogs offrant des informations et des stratégies approfondies pour défendre contre les cyber-risques sophistiqués menaçant OT ... Le post la chasse: détection est apparu pour la première fois sur dragos .
>Welcome back to “The Hunt,” our blog series offering in-depth insights and strategies for defending against sophisticated cyber risks threatening OT... The post The Hunt: Detecting VOLTZITE Threat Group Activity in Critical Infrastructure  first appeared on Dragos.
Threat Industrial ★★★
IndustrialCyber.webp 2024-04-09 17:44:10 Sécurité en cascade et partenaire Axys pour offrir une protection contre les centres de données
Waterfall Security and AXYS partner to deliver OT protection for data centers
(lien direct)
> Waterfall Security et Axys ont annoncé mardi un nouveau partenariat qui offrira un nouveau niveau d'OT (opérationnel ...
>Waterfall Security and AXYS announced Tuesday a new partnership that will deliver a new level of OT (operational...
Industrial ★★
IndustrialCyber.webp 2024-04-09 17:43:23 Otorio s'intègre à ServiceNow pour stimuler la cybersécurité opérationnelle et l'efficacité
OTORIO integrates with ServiceNow to boost operational cybersecurity and efficiency
(lien direct)
> La société de solutions de gestion des cyber-risques de sécurité otorio a annoncé mardi une intégration pour une gestion de sécurité OT dédiée avec ...
>OT security cyber risk management solutions company OTORIO announced Tuesday an integration for dedicated OT security management with...
Industrial ★★
InfoSecurityMag.webp 2024-04-09 14:00:00 L'interférence étrangère entraîne une augmentation record du vol IP
Foreign Interference Drives Record Surge in IP Theft
(lien direct)
DTEX affirme que l'espionnage industriel et le vol IP sont à un niveau record grâce aux initiés malveillants
DTEX claims industrial espionage and IP theft are at an all-time high thanks to malicious insiders
Industrial ★★★
itsecurityguru.webp 2024-04-08 14:20:29 4 leçons Les entreprises industrielles peuvent tirer de la bibliothèque britannique Cyberattack
4 lessons industrial companies can draw from the British Library cyberattack
(lien direct)
Alors que les cyberattaques se produisent quotidiennement, peu attirent autant d'attention et de couverture médiatique que l'attaque qui a frappé la bibliothèque britannique en octobre 2023. L'attaque, qui a paralysé les systèmes en ligne de la bibliothèque \\ pendant des mois et a provoqué un coût estimé de & livre; 7 millions, était frappant par son ampleur.Pourtant, les attaquants de Blueprint suivis sont malheureusement familiers.Après [& # 8230;] Le post 4 leçons Les sociétés industrielles peuvent s'appuyer dans la cyberattaque de la bibliothèque britannique C'est apparu pour la première fois sur gourou de la sécurité informatique .
While cyberattacks occur daily, few garner as much attention and media coverage as the attack that struck the British Library in October 2023. The attack, which paralysed the Library\'s online systems for months and caused an estimated cost of £7 million, was striking by its magnitude. Yet, the blueprint attackers followed is sadly familiar. After […] The post 4 lessons industrial companies can draw from the British Library cyberattack first appeared on IT Security Guru.
Industrial ★★★
AlienVault.webp 2024-04-08 10:00:00 10 stratégies pour fortifier la sécurité du système SCADA
10 Strategies to Fortify SCADA System Security
(lien direct)
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Here are some of the best SCADA protection strategies to ensure your organization\'s safety. Late last year, Pennsylvania\'s Municipal Water Authority of Aliquippa (MWAA) fell victim to a sophisticated cyberattack, targeting its SCADA system at a key booster station. This station, crucial for regulating water pressure across Raccoon and Potter townships in Beaver County, experienced a temporary loss of communication, triggering an immediate investigation. Upon closer examination, the technicians discovered a clear indication of a cyberattack: a message declaring, "You have been hacked." This startling discovery led to the swift activation of manual control systems, ensuring that water quality and supply remained unaffected despite the breach. The hacked device operated on a separate network, distinct from the main corporate systems. This separation helped to limit the breach\'s impact and prevented it from affecting other essential parts of the infrastructure. The hackers, identified as being affiliated with an Iranian group, specifically targeted this equipment due to its Israeli-made components. This choice of target was part of a broader strategy, as similar devices are commonly used in water utility stations both in the US and internationally, hinting at the potential for more widespread attacks. The incident drew significant attention from US legislators, who expressed concerns about the vulnerability of the nation\'s critical infrastructure to such cyberattacks. The breach underscored the urgent need for enhanced cybersecurity measures across similar utilities, especially those with limited resources and exposure to international conflicts. Investigations by the Federal Bureau of Investigation and the Pennsylvania State Police were launched to examine the specifics of the attack. The cybersecurity community pointed out that industrial control systems, like the SCADA system breached at MWAA, often have inherent security weaknesses, making them susceptible to such targeted attacks. The following discussion on SCADA defense strategies aims to address these challenges, proposing measures to fortify these vital systems against potential cyberattacks and ensuring the security and reliability of essential public utilities. How to Enhance SCADA System Security? The breach at the MWAA sharply highlights the inherent vulnerabilities in SCADA systems, a crucial component of our critical infrastructure. In the wake of this incident, it\'s imperative to explore robust SCADA defense strategies. These strategies are not mere recommendations but essential steps towards safeguarding our essential public utilities from similar threats. 1. Network Segmentation: This strategy involves creating \'zones\' within the SCADA network, each with its own specific security controls. This could mean separating critical control systems from the rest of the network, or dividing a large system into smaller, more manageable segments. Segmentation often includes implementing demilitarized zones (DMZs) between the corporate and control networks. This reduces the risk of an attacker being able to move laterally across the network and access sensitive areas after breaching a less secure section. 2. Access Control and Authentication: Beyond basic measures, access control in SCADA systems should involve a comprehensive management of user privileges. This could include role-based access controls, where users are granted access rights depending on their job function, and time-based access controls, limiting access to certain times for specific users. Strong authentication methods also Vulnerability Threat Patching Legislation Industrial ★★★★
IndustrialCyber.webp 2024-04-06 12:54:18 Le rapport de recherche Xage-Takepoint révèle une adoption croissante de la sécurité de la fiducie zéro dans les entreprises industrielles
Xage-Takepoint Research report reveals growing adoption of zero trust security in industrial enterprises
(lien direct)
Zero Trust Access and Protection Vendor Xage Security, en collaboration avec Takepoint Research, a dévoilé de nouvelles recherches cette semaine ...
​​Zero trust access and protection vendor Xage Security, in collaboration with Takepoint Research, unveiled new research this week...
Industrial ★★
RiskIQ.webp 2024-04-05 13:39:39 Même cibles, nouveaux manuels: les acteurs de la menace en Asie de l'Est utilisent des méthodes uniques
Same targets, new playbooks: East Asia threat actors employ unique methods
(lien direct)
## Snapshot Microsoft has observed several notable cyber and influence trends from China and North Korea since June 2023 that demonstrate not only doubling down on familiar targets, but also attempts to use more sophisticated influence techniques to achieve their goals.   Chinese cyber actors broadly selected three target areas over the last seven months. - One set of Chinese actors extensively targeted entities across the South Pacific Islands. - A second set of Chinese activity continued a streak of cyberattacks against regional adversaries in the South China Sea region. - Meanwhile, a third set of Chinese actors compromised the US defense industrial base. Chinese influence actors-rather than broadening the geographic scope of their targets-honed their techniques and experimented with new media. Chinese influence campaigns continued to refine AI-generated or AI-enhanced content. The influence actors behind these campaigns have shown a willingness to **both amplify AI-generated media that benefits their strategic narratives, as well as create their own video, memes, and audio content**. Such tactics have been used in campaigns stoking divisions within the United States and exacerbating rifts in the Asia-Pacific region-including Taiwan, Japan, and South Korea. These campaigns achieved varying levels of resonance with no singular formula producing consistent audience engagement.    North Korean cyber actors made headlines for **increasing software supply chain attacks and cryptocurrency heists over the past year**. While strategic spear-phishing campaigns targeting researchers who study the Korean Peninsula remained a constant trend, North Korean threat actors appeared to make greater use of legitimate software to compromise even more victims. ## Activity Overview ### Chinese cyber operations target strategic partners and competitors #### Gingham Typhoon targets government, IT, and multinational entities across the South Pacific Islands **![Graph showing targeted regions in the South Pacific by China based threat actor Gingham Typhoon](https://cdn-riq-ti.azureedge.net/49bcef0e-36ca-42a0-a66d-f5339c8b48e2)** *Figure 1: Observed events from Gingham Typhoon from June 2023 to January 2024 highlights their continued focus on South Pacific Island nations. However, much of this targeting has been ongoing, reflecting a yearslong focus on the region. Geographic locations and diameter of symbology are representational. * During the summer of 2023, Microsoft Threat Intelligence observed extensive activity from China-based espionage group Gingham Typhoon that targeted nearly every South Pacific Island country. Gingham Typhoon is the most active actor in this region, hitting international organizations, government entities, and the IT sector with complex phishing campaigns. Victims also included vocal critics of the Chinese government. Diplomatic allies of China who were victims of recent Gingham Typhoon activity include executive offices in government, trade-related departments, internet service providers, as well as a transportation entity. Heightened geopolitical and diplomatic competition in the region may be motivations for these offensive cyber activities. China pursues strategic partnerships with South Pacific Island nations to expand economic ties and broker diplomatic and security agreements. Chinese cyber espionage in this region also follows economic partners. For example, Chinese actors engaged in large-scale targeting of multinational organizations in Papua New Guinea, a longtime diplomatic partner that is benefiting from multiple Belt and Road Initiative (BRI) projects including the construction of a major highway which links a Papua New Guinea government building to the capital city\'s main road. (1) #### Chinese threat actors retain focus on South China Sea amid Western military exercises China-based threat actors continued to target entities related to China\'s economic and military interests in a Malware Tool Vulnerability Threat Studies Industrial Prediction Technical Guam ★★★
IndustrialCyber.webp 2024-04-05 12:14:06 HMS Networks, Red Lion Collaborent pour stimuler les offres d'informations industrielles et de technologies de communication
HMS Networks, Red Lion collaborate to boost industrial information and communication technology offerings
(lien direct)
HMS Networks a finalisé l'acquisition de contrôles Red Lion à partir de Spectris Group Holdings Limited.Les deux sociétés ...
HMS Networks has finalized the acquisition of Red Lion Controls from Spectris Group Holdings Limited. The two companies...
Industrial ★★
IndustrialCyber.webp 2024-04-05 12:11:07 Exalens s'associe à Hoop Cyber pour stimuler la résilience du système cyber-physique dans les opérations industrielles
Exalens partners with HOOP Cyber to boost cyber-physical system resilience in industrial operations
(lien direct)
> EXALENS a annoncé un partenariat avec Hoop Cyber, un conseil en génie des cyber-données de nouvelle génération dédié à l'autonomisation des organisations ...
>Exalens has announced a partnership with HOOP Cyber, a next-generation cyber data engineering consultancy dedicated to empowering organizations...
Industrial ★★
IndustrialCyber.webp 2024-04-05 12:10:11 Ampère la sécurité industrielle est en train de renommer AMPYX Cyber, élargit la présence mondiale avec de nouveaux bureaux
Ampere Industrial Security rebrands to Ampyx Cyber, expands global presence with new offices
(lien direct)
> Ampère Industrial Security, réputée pour son expertise en sécurité industrielle, annonce son changement de marque à AMPYX Cyber, marquant un ...
>Ampere Industrial Security, renowned for its expertise in industrial security, announces its rebranding to Ampyx Cyber, marking a...
Industrial ★★★
The_Hackers_News.webp 2024-04-04 16:57:00 Considérations pour la cybersécurité des technologies opérationnelles
Considerations for Operational Technology Cybersecurity
(lien direct)
La technologie opérationnelle (OT) & NBSP; fait référence au matériel et aux logiciels utilisés pour modifier, surveiller ou contrôler les appareils, processus et événements physiques de l'Enterprise \\.Contrairement aux systèmes traditionnels des technologies de l'information (TI), les systèmes OT ont un impact direct sur le monde physique.Cette caractéristique unique de l'OT apporte des considérations de cybersécurité supplémentaires qui ne sont généralement pas présentes dans la sécurité informatique conventionnelle
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise\'s physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security
Industrial ★★
DarkReading.webp 2024-04-02 12:00:00 Les cyberattaques produisaient une perturbation physique en augmentation
Cyberattacks Wreaking Physical Disruption on the Rise
(lien direct)
Les groupes de ransomware ont entré dans la fabrication d'autres parties du secteur OT en 2023, et quelques attaques ont causé des dommages à huit et neuf chiffres.Mais le pire n'est pas encore venu en 2024.
Ransomware groups tore into manufacturing other parts of the OT sector in 2023, and a few attacks caused eight- and nine-figure damages. But worse is yet to come in 2024.
Ransomware Industrial ★★★
IndustrialCyber.webp 2024-04-02 11:26:02 New Mitre Engage Mappings publié pour ATT & CK pour ICS, ATT & CK pour mobile
New MITRE Engage mappings released for ATT&CK for ICS, ATT&CK for Mobile
(lien direct)
L'organisation à but non lucratif, Mitre, a annoncé lundi que son équipe ENGED avait introduit de nouvelles mappages pour les techniques de l'ATT & # 38; CK ...
Non-profit organization MITRE announced Monday that its Engage team has introduced new mappings for techniques from the ATT&CK...
Mobile Industrial ★★
The_Hackers_News.webp 2024-04-02 10:24:00 La campagne de phishing massive frappe l'Amérique latine: Venom Rat ciblant plusieurs secteurs
Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors
(lien direct)
L'acteur de menace connu sous le nom de & NBSP; TA558 & NBSP; a été attribué à une nouvelle campagne de phishing massive qui cible un large éventail de secteurs en Amérique latine dans le but de déployer Venom Rat. Les attaques ont principalement distingué l'hôtel, les voyages, le commerce, les finances, la fabrication, l'industrie et le gouvernement en Espagne, au Mexique, aux États-Unis, en Colombie, au Portugal, au Brésil, à la République dominicaine, et
The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT. The attacks primarily singled out hotel, travel, trading, financial, manufacturing, industrial, and government verticals in Spain, Mexico, United States, Colombia, Portugal, Brazil, Dominican Republic, and
Threat Industrial ★★★
IndustrialCyber.webp 2024-04-01 12:55:31 US DOD dévoile la stratégie de cybersécurité Dib 2024 pour renforcer les cyber-défenses nationales
US DoD unveils DIB Cybersecurity Strategy 2024 to strengthen national cyber defenses
(lien direct)
> Le Département américain de la Défense (DOD) a publié sa stratégie de cybersécurité de la base industrielle de la défense (DIB), une approche exploitable ...
>The U.S. Department of Defense (DoD) has published its Defense Industrial Base (DIB) Cybersecurity Strategy, an actionable approach...
Industrial ★★
IndustrialCyber.webp 2024-03-30 21:37:16 Besoin croissant de mettre en œuvre des stratégies de récupération post-invidence efficaces dans l'évolution des environnements d'OT, ICS
Growing need to implement effective post-incident recovery strategies in evolving OT, ICS environments
(lien direct)
Les stratégies de récupération post-incidence sont vitales dans les milieux OT et ICS pour réduire les perturbations de la cybersécurité et réduire les impacts des incidents ....
Post-incident recovery strategies are vital in OT and ICS settings to lessen cybersecurity disruptions and reduce incident impacts....
Industrial ★★
RecordedFuture.webp 2024-03-28 18:55:00 Pentagon lays out strategy to improve defense industrial base cybersecurity (lien direct) Le Pentagone a publié jeudi sa toute première stratégie de cybersécurité pour mieux protéger sa base industrielle massive contre les pirates."Alors que nos adversaires recherchent en permanence des informations sur les capacités américaines, le ministère, en coordination avec le Dib [Base industrielle de la défense], doit rester résilient contre ces attaques et réussir dans le travail d'équipe pour défendre la nation", a déclaré la défense adjointe
The Pentagon on Thursday released its first ever cybersecurity strategy to better protect its massive industrial base from hackers. "As our adversaries continuously seek information about U.S. capabilities, the Department, in coordination with the DIB [defense industrial base], must remain resilient against these attacks and succeed through teamwork to defend the Nation,” Deputy Defense
Industrial ★★
globalsecuritymag.webp 2024-03-27 16:49:44 Nozomi Networks étend son partenariat avec Yokogawa (lien direct) Nozomi Networks étend son partenariat avec Yokogawa pour délivrer ses services de sécurité OT et IoT dans le monde entier Les fonctionnalités de Nozomi Networks sur la visibilité OT / IoT et la détection des menaces sont désormais intégrées aux services gérés de cybersécurité de Yokogawa et proposés à des clients dans 60 pays à travers le monde. - Business Threat Industrial ★★
IndustrialCyber.webp 2024-03-27 15:34:18 Nozomi Networks, Yokogawa Extend Alliance pour fournir des services de sécurité OT et IoT dans le monde entier
Nozomi Networks, Yokogawa extend alliance to deliver OT and IoT security services globally
(lien direct)
> Nozomi Networks Inc., fournisseur d'offres de sécurité OT et IoT, a annoncé mercredi qu'elle avait étendu son partenariat ...
>Nozomi Networks Inc., vendor of OT and IoT security offerings, announced Wednesday that it has extended its partnership...
Industrial ★★
IndustrialCyber.webp 2024-03-26 23:07:12 Cyolo s'associe à TD Synnex pour exploiter une demande accrue de l'entreprise pour un accès à distance sécurisé
Cyolo partners with TD SYNNEX to tap into increased enterprise demand for secure remote access
(lien direct)
> Access Company for Industrial Enterprises Cyolo a annoncé mardi un partenariat avec Synnex, Global Distributor and Solutions Aggregator for ...
>Access company for industrial enterprises Cyolo announced Tuesday a partnership with TD SYNNEX, global distributor and solutions aggregator for...
Industrial ★★
The_Hackers_News.webp 2024-03-26 22:24:00 Package NuGet malveillant lié à l'espionnage industriel cible les développeurs
Malicious NuGet Package Linked to Industrial Espionage Targets Developers
(lien direct)
Les chasseurs de menaces ont identifié un ensemble suspect dans le & nbsp; Nuget Package Manager & NBSP; qui a probablement conçu pour cibler les développeurs travaillant avec des outils fabriqués par une entreprise chinoise spécialisée dans la fabrication d'équipements industriels et numériques. Le package en question est & nbsp; sqzrframework480, qui inverselabs a déclaré a été publié pour la première fois le 24 janvier 2024. Il a été & nbsp; téléchargé & nbsp;
Threat hunters have identified a suspicious package in the NuGet package manager that\'s likely designed to target developers working with tools made by a Chinese firm that specializes in industrial- and digital equipment manufacturing. The package in question is SqzrFramework480, which ReversingLabs said was first published on January 24, 2024. It has been downloaded 
Tool Threat Industrial ★★
globalsecuritymag.webp 2024-03-26 21:21:11 Denexus et Cipher Partner pour transformer la cybersécurité pour les infrastructures critiques industrielles et physiques
DeNexus and Cipher Partner to Transform Cybersecurity for Industrial and Physical Critical Infrastructure
(lien direct)
Denexus et Cipher Partner pour transformer la cybersécurité pour l'infrastructure critique industrielle et physique Denexus et Cipher unissent leurs forces pour résoudre l'OT et les CI cyber-risques pour les marchés critiques - nouvelles commerciales
DeNexus and Cipher Partner to Transform Cybersecurity for Industrial and Physical Critical Infrastructure DeNexus and Cipher join forces to solve OT and ICS cyber risk for critical markets - Business News
Industrial ★★★
IndustrialCyber.webp 2024-03-26 19:13:22 CS4CA USA Summit 2024: Les chefs de sécurité informatiques et OT partagent des informations sur les stratégies d'atténuation et de récupération de la cyberattaque
CS4CA USA Summit 2024: IT and OT security leaders share insights on cyberattack mitigation and recovery strategies
(lien direct)
Le 12e Sommet annuel Cyber Security for Critical Assets (CS4CA) a commencé mardi à Houston, au Texas, réunissant ...
The 12th annual Cyber Security for Critical Assets (CS4CA) USA Summit began Tuesday in Houston, Texas bringing together...
Industrial ★★
IndustrialCyber.webp 2024-03-26 19:10:15 Denexus, partenaire de chiffre pour transformer la cybersécurité pour les infrastructures critiques industrielles
DeNexus, Cipher partner to transform cybersecurity for industrial, physical critical infrastructure
(lien direct)
> Denexus, fournisseur de quantification et de gestion de la cyber-risque pour la technologie opérationnelle (OT) avec les entreprises industrielles et la critique physique ...
>DeNexus, vendor of cyber risk quantification and management for operational technology (OT) with industrial enterprises and physical critical...
Industrial ★★★
securityintelligence.webp 2024-03-26 13:00:00 Prédictions ICS CERT pour 2024: ce que vous devez savoir
ICS CERT predictions for 2024: What you need to know
(lien direct)
> Alors que nous travaillons au premier trimestre de 2024, divers secteurs s'adaptent continuellement aux menaces de cybersécurité de plus en plus complexes.Des secteurs comme les soins de santé, la finance, l'énergie et le transport élargissent régulièrement leur infrastructure numérique, entraînant des surfaces d'attaque plus importantes et une plus grande exposition aux risques.Kaspersky vient de publier leurs prédictions ICS CERT pour cette année, décrivant la clé [& # 8230;]
>As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure. Kaspersky just released their ICS CERT Predictions for this year, outlining the key […]
Industrial Medical ★★★★
Dragos.webp 2024-03-26 12:30:00 Étendre la protection de l'infrastructure OT avec automatisation de Dragos et de Swimlane
Extend Protection for OT Infrastructure with Automation from Dragos and Swimlane
(lien direct)
> Résumé de l'exécutif: Une nouvelle intégration avec la plate-forme DRAGOS pour la surveillance et la visibilité du réseau OT et la turbine de Swinklane permet aux clients de ... Le post prolongez la protection de l'infrastructure OT avec automatisationDe Dragos et du Swimlane est apparu pour la première fois sur dragos .
>Executive Summary: New integration with the Dragos Platform for OT network monitoring and visibility and Swimlane Turbine enables customers to... The post Extend Protection for OT Infrastructure with Automation from Dragos and Swimlane first appeared on Dragos.
Industrial ★★★
DarkReading.webp 2024-03-26 12:00:00 Package Nuget douteux peut présager l'espionnage industriel chinois
Dubious NuGet Package May Portend Chinese Industrial Espionage
(lien direct)
Un package .NET disponible en téléchargement en ce moment est une porte dérobée de systèmes industriels furtifs ou rien du tout.
A .NET package available for download right now is either a stealthy industrial systems backdoor or nothing at all.
Industrial ★★★
IndustrialCyber.webp 2024-03-23 20:42:59 L'escalade des cyber-menaces maritimes pousse le gouvernement fédéral à prendre des mesures proactives, sauvegarde la sécurité nationale
Escalating maritime cyber threats pushes federal government to take proactive steps, safeguard national security
(lien direct)
Au milieu de l'escalade des problèmes de cybersécurité dans le secteur maritime, le président américain Joe Biden a récemment signé un décret (EO) ...
Amid escalating cybersecurity concerns within the maritime sector, U.S. President Joe Biden recently signed an Executive Order (EO)...
Industrial ★★★
The_Hackers_News.webp 2024-03-21 14:53:00 Donner un sens aux attaques technologiques opérationnelles: le passé, le présent et l'avenir
Making Sense of Operational Technology Attacks: The Past, Present, and Future
(lien direct)
Lorsque vous lisez des rapports sur les cyberattaques affectant la technologie opérationnelle (OT), il est facile de se faire prendre dans le battage médiatique et de supposer que chacun est sophistiqué.Mais les environnements OT dans le monde sont-ils vraiment assiégés par un barrage constant de cyberattaques complexes?Répondre à cela nécessiterait de décomposer les différents types de cyberattaques OT, puis de regarder en arrière sur tous les
When you read reports about cyber-attacks affecting operational technology (OT), it\'s easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the
Industrial ★★★
Netskope.webp 2024-03-20 15:00:00 Déverrouillez la puissance de la succursale de la prochaine génération avec une intelligence de dispositif IoT / OT intégré dans Unified Sase Gateway
Unlock the Power of Next Gen SASE Branch with IoT/OT Device Intelligence Integrated in Unified SASE Gateway
(lien direct)
> Imaginez un avenir où les machines à café Office commandent de manière autonome les grains, et le confort et l'efficacité énergétique sont gérés sans effort grâce à l'éclairage intelligent et aux commandes de température, aux côtés des usines intelligentes tirant parti des bras robotiques pour une production optimale.Le marché de l'Internet des objets (IoT) devrait atteindre 55,7 milliards d'appareils d'ici 2025, comme prévu par IDC, ce potentiel [& # 8230;]
>Imagine a future where office coffee machines autonomously order beans, and both comfort and energy efficiency are effortlessly managed through smart lighting and temperature controls, alongside smart factories leveraging robotic arms for optimal production. With the internet of things (IoT) market expected to reach 55.7 billion devices by 2025, as predicted by IDC, this potential […]
Industrial ★★★
globalsecuritymag.webp 2024-03-20 14:36:21 Palo Alto Networks dévoile son nouveau rapport sur l\'état de la sécurité OT (lien direct) Palo Alto Networks dévoile son nouveau rapport sur l'état de la sécurité OT Les cyberattaques ont mis hors service 1 entreprise industrielle sur 4 ! La complexité de la sécurité OT est un obstacle majeur - Investigations Studies Industrial ★★★★
Dragos.webp 2024-03-20 13:58:32 La chasse: la chasse aux menaces dans les environnements OT
The Hunt: Threat Hunting in OT Environments
(lien direct)
> Bienvenue à & # 8220; The Hunt, & # 8221;Une série de blogs s'est concentrée sur le rôle essentiel de la chasse aux menaces dans les environnements de technologie opérationnelle (OT) .... Le post The Hunt: Hugen Hunting in OT Environments est apparu pour la première fois sur dragos .
>Welcome to “The Hunt,” a blog series focused on the critical role of threat hunting within operational technology (OT) environments.... The post The Hunt: Threat Hunting in OT Environments  first appeared on Dragos.
Threat Industrial Technical ★★★
securityintelligence.webp 2024-03-20 13:00:00 Le secteur de l'énergie britannique fait face à un paysage de menace en expansion
The UK energy sector faces an expanding OT threat landscape
(lien direct)
> L'infrastructure critique est attaquée dans presque tous les pays, mais surtout au Royaume-Uni.Le Royaume-Uni était le pays le plus attaqué d'Europe, qui est déjà la région la plus touchée par les cyber-incidents.L'industrie de l'énergie prend le poids de ces cyberattaques, selon IBM & # 8217; s X-Force Threat Intelligence Index 2024. Le secteur de l'énergie [& # 8230;]
>Critical infrastructure is under attack in almost every country, but especially in the United Kingdom. The UK was the most attacked country in Europe, which is already the region most impacted by cyber incidents. The energy industry is taking the brunt of those cyberattacks, according to IBM’s X-Force Threat Intelligence Index 2024. The energy sector […]
Threat Industrial ★★★
IndustrialCyber.webp 2024-03-20 12:59:49 Guide complet des opérations intégrées (partie 4)
Comprehensive Guide to Integrated Operations (Part 4)
(lien direct)
> Exigences du réseau et de la cybersécurité: TIC pour les opérations intégrées dans les opérations intégrées, où les technologies de l'information et de la communication ...
>Network and OT Cyber Security Requirements: ICT for Integrated Operations In Integrated Operations, where Information and Communication Technology...
Industrial ★★★
globalsecuritymag.webp 2024-03-20 08:35:30 Nozomi Networks lance la plate-forme SaaS pour la sécurité OT et IoT dans les Émirats arabes unis
Nozomi Networks Launches SaaS Platform for OT and IoT Security in the United Arab Emirates
(lien direct)
Nozomi Networks lance la première plateforme SaaS pour la sécurité OT et IoT Aux Émirats arabes unis élargit l'empreinte mondiale avec une nouvelle région de vue aux EAU;Prend en charge la stratégie de cybersécurité des EAU pour renforcer les infrastructures numériques et accélérer la transformation numérique et les initiatives de la ville intelligente - revues de produits
Nozomi Networks Launches First SaaS Platform for OT and IoT Security in the United Arab Emirates Expands global footprint with new Vantage region in the UAE; supports UAE Cyber Security Strategy to strengthen digital infrastructure and accelerate digital transformation and smart city initiatives - Product Reviews
Industrial Cloud ★★
IndustrialCyber.webp 2024-03-19 14:22:10 Les guides NCSC UK \\ ont migration des systèmes SCADA vers le cloud pour les organisations OT, permettant des décisions informées au risque
UK\\'s NCSC guides migrating SCADA systems to cloud for OT organizations, enabling risk-informed decisions
(lien direct)
> Lundi, le National Cyber Security Center (NCSC) du Royaume-Uni a publié des conseils de sécurité pour aider les organisations en utilisant la technologie opérationnelle ...
>On Monday, the UK’s National Cyber Security Centre (NCSC) issued security guidance to assist organizations utilizing operational technology...
Industrial Cloud ★★
SecureList.webp 2024-03-19 10:00:20 Paysage de menace pour les systèmes d'automatisation industrielle.H2 2023
Threat landscape for industrial automation systems. H2 2023
(lien direct)
Kaspersky ICS CERT partage les statistiques des menaces industrielles pour H2 2023: les objets malveillants le plus souvent détectés, les sources de menaces, le paysage des menaces par l'industrie et la région.
Kaspersky ICS CERT shares industrial threat statistics for H2 2023: most commonly detected malicious objects, threat sources, threat landscape by industry and region.
Threat Studies Industrial ★★★★
IndustrialCyber.webp 2024-03-18 17:37:51 CS4CA US Summit 2024 rassemble des leaders de la sécurité et des OT pour la protection des infrastructures critiques
​​CS4CA US Summit 2024 brings together IT and OT security leaders for critical infrastructure protection
(lien direct)
Après le récent événement S4x24, l'industrie de la cybersécurité convergera à nouveau lors du prochain 12e cyber ... annuel à venir ...
Following the recent S4x24 event, the cybersecurity industry will converge once again at the upcoming 12th annual Cyber...
Industrial Conference ★★★
CS.webp 2024-03-15 20:23:25 Confronté à la menace de piratage chinois, les pros de la cybersécurité industrielle Demandent: Quoi de neuf?
Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new?
(lien direct)
> Lors de la plus grande conférence sur la cybersécurité industrielle du monde \\, les opérations de Pékin \\ ciblant l'infrastructure critique américaine n'étaient qu'une préoccupation parmi beaucoup.
>At the world\'s largest industrial cybersecurity conference, Beijing\'s operations targeting U.S. critical infrastructure was just one concern among many.
Threat Industrial Conference ★★★
IndustrialCyber.webp 2024-03-15 09:53:56 Mitsubishi Electric, Nozomi pour développer l'activité de sécurité OT pour une sécurité et une disponibilité améliorées du système
Mitsubishi Electric, Nozomi to expand OT security business for enhanced system security and availability
(lien direct)
Mitsubishi Electric Corporation a annoncé jeudi qu'elle était parvenue à un accord avec Nozomi Networks Inc., développeur et ...
Mitsubishi Electric Corporation announced Thursday that it has reached an agreement with Nozomi Networks Inc., a developer and...
Industrial ★★★
Last update at: 2024-05-11 22:08:10
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter