article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

Industroyer2 was discovered in the network of a Ukrainian energy provider, and it is very unlikely that the attacker would have been able to develop it without access to the same ICS equipment as used by the victim. Taking sides: professional ransomware groups, hacktivists, and DDoS attacks.

DDOS 136
article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Unfortunately, threat actors can also take advantage of 5G’s enhanced connectivity, executing network attacks faster than ever before. Hackers can spread malware via IoT networks, disrupt supply chains in development, and use a fleet of routers as an IoT botnet to launch a DDoS attack. Network Slice Compromise.

Risk 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security Roundup for March 2021

Security Boulevard

The energy firm did not say how many accounts were affected by the breach, which was first reported by MoneySavingExpert.com. In Israel, Iranian state actors attempted, without success, to attack Israeli water utilities last year. DDoS Attacks Leverage Plex Media Server. Npower App Hack.

article thumbnail

Securing the Edge Ecosystem Global Research released – Complimentary report available

CyberSecurity Insiders

The results focus on common edge use cases in seven vertical industries – healthcare, retail, finance, manufacturing, energy and utilities, transportation, and U.S. Our data shows that DDoS (Distributed Denial of Service) attacks are now the top concern (when examining the data in the aggregate vs. by industry).