article thumbnail

Threat actor claims to have stolen 1 TB of data belonging to Saudi Aramco

Security Affairs

This isn’t the first attack suffered by the Oil giant, in 2012 Saudi Aramco suffered a major cyber attack, alleged nation-state actors used the Shamoon wiper to destroy over 30,000 computers of the company. ZeroX is also offering a 1 GB sample for US$2,000 that could be paid in Monero (XMR) virtual currency.

article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

History of MSSPs As internet service providers (ISPs) and telecommunications companies (telecoms) began offering commercial access to the internet in the late 1990s, they began to also offer firewall appliances and associated managed services. As cyber attacks continue to increase in number and sophistication, the need for MSSPs grows.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

The threat of attacks against Critical National Infrastructure (CNI) – energy, utilities, telecommunications, and transportation – is a top priority. Reducing the risk of attacks such as ransomware and malware on CNI will be paramount to the stability of national economies for the years to come.

article thumbnail

Enhancing Maritime Security: Lessons from the Key Bridge Incident

SecureWorld News

While anything is possible when it comes to determined cyber attackers to cause malfunctions or take over systems, and several theories have been floated, there has not been such a finding in this case, to date. However, was it a cyber incident? Could fenders to ward off a glancing blow from a big ship have helped here?

article thumbnail

Lessons From the 2023 National Risk Register Report  

IT Security Guru

The 2023 Edition of the National Risk Register predicts that, in the next two years, there is a 5 to 25% chance that a devastating attack will target critical infrastructure and cause physical harm. A nationwide loss of power could create a ripple effect, causing disruption to internet telecommunications, water, sewage, fuel and gas supplies.

Risk 92
article thumbnail

What Is Penetration Testing? Complete Guide & Steps

eSecurity Planet

Penetration tests are simulated cyber attacks executed by white hat hackers on systems and networks. The goal of these simulations is to detect vulnerabilities, misconfigurations, errors, and other weaknesses that real attackers could exploit.

article thumbnail

Iranian Threat Actors: Preliminary Analysis

Security Affairs

The group’s victims are mainly in the telecommunications, government (IT services), and oil sectors.” The usage of Mimikatz could be easily adopted for credential dumping, while TinyZBot is a quite interesting tool since it mostly implements spying capabilities without strong architectural design or code execution or data exfiltration.