Remove Authentication Remove Energy and Utilities Remove Firewall
article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

To ensure energy security and economic stability, protecting the infrastructure is essential. A report from 2023 revealed that 67% of energy and utility companies faced ransomware attacks, with many incidents exploiting unpatched vulnerabilities. This significantly reduces the risk of unauthorized access.

article thumbnail

Duo Desktop: Packed with Features to Ease MFA and Boost Security

Duo's Security Blog

For this reason, we have evolved the application from merely providing health checks to incorporating a myriad of features that ease the burden of MFA, enhance security, and offer an additional method of authentication. Duo keeps your users secure without getting in their way with relentless authentication prompts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iranian Hackers Target U.S. Water Facility

SecureWorld News

The utility's general manager, Robert J. The attack has been linked to CyberAv3ngers, an Iranian-backed group known for its focus on targeting Israeli water and energy sites. Require multifactor authentication for all remote access to the OT network, including from the IT network and external networks.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. Cisco Secure Firewall integrations. Cisco Secure Firewall has several new partner integrations. The Secure Firewall app for Splunk has been updated. Read more here.

article thumbnail

Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations

Security Affairs

. “As early as 2022, APT28 actors had utilized compromised EdgeRouters to facilitate covert cyber operations against governments, militaries, and organizations around the world.” The operation reversibly modified the routers’ firewall rules to block remote management access to the devices. ” reads the joint report.

article thumbnail

China-linked APT Volt Typhoon exploited a zero-day in Versa Director

Security Affairs

Exploitation requires successful authentication by a user with the necessary privileges. Although details are limited, Versa Networks confirmed one case where the vulnerability was exploited due to a customer’s failure to implement recommended firewall guidelines. ” reads the advisory published by Versa Networks. .

article thumbnail

Advisory: Malicious North Korean Cyber Activity

SecureWorld News

Here's what Blindingcan has accomplished so far: "A threat group with a nexus to North Korea targeted government contractors early this year to gather intelligence surrounding key military and energy technologies. If these services are required, use strong passwords or Active Directory authentication.