article thumbnail

GUEST ESSAY: Here’s why castle-wall defenses utterly fail at stopping deceptive adversaries

The Last Watchdog

When it comes to cyber attacks, most businesses think: “It could never happen to us,” but some plots are just hitting a little too close to home. Related: T-Mobile breach reflects rising mobile device attacks. Living-off-the-land (LotL) attacks are providing a way for adversaries to stay under cover.

article thumbnail

FBI chief says China is preparing to attack US critical infrastructure

Security Affairs

China-linked threat actors are preparing cyber attacks against U.S. FBI Director Christopher Wray warned this week that China-linked threat actors are preparing an attack against U.S. The Volt Typhoon group has been active since at least mid-2021 it carried out cyber operations against critical infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

If you believe the headlines, the first known disruptive cyber attack against the U.S. grid happened on March 5, 2019 when an unidentified actor attacked firewalls at an undisclosed utility that was part of the power grid in California, Utah and Wyoming. Department of Energy and was called “unprecedented.”

article thumbnail

Industrial Switches from different Vendors Impaired by Similar Exposures

Hacker Combat

Energy and power. Thomas Weber, the researcher at SEC Consult who identified these exposures, says that the switches are utilized in various significant positions across the network. Affected gadgets are often used in the following industries: Transportation. Heavy machinery. Automation. Surveillance. Enforcing security best practices.

article thumbnail

Adoption of Secure Cloud Services in Critical Infrastructure

CyberSecurity Insiders

In an example from last year, lack of risk-based adoption of cloud software and lack of controls to prevent access to ICS networks caused service disruption at a US drinking water treatment facility, where cyber-attack via poorly controlled cloud software (desktop sharing) had increased sodium hydroxide levels in drinking water [v].

IoT 134
article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

A common thread runs through the cyber attacks that continue to defeat the best layered defenses money can buy. Related: We’re in the midst of ‘cyber Pearl Harbor’ Peel back the layers of just about any sophisticated, multi-staged network breach and you’ll invariably find memory hacking at the core.

Hacking 212
article thumbnail

A Cybersecurity Conversation with Vince Moore – Senior Network Engineer at OPSWAT

CyberSecurity Insiders

More than 1,500 organizations worldwide spanning Financial Services, Defense, Manufacturing, Energy, Aerospace, and Transportation Systems trust OPSWAT to secure their files and devices; ensure compliance with industry and government-driven policies and regulations, and protect their reputation, finances,? networking infrastructure.