Industrial security: Challenges and opportunities Industrial security: Challenges and opportunities Security for the industrial internet of things (IIoT) and operational technology (OT) is in its infancy...
Category: Cyber Attacks
Attack CISO2CISO Notepad Series Cyber Attacks Industrial Cyber Security IoT - OT Cybersecurity TOP Featured Post User most voted post
Attack CISO2CISO Notepad Series Cyber Attacks DeepFakes Attacks DeepFakes Attacks TOP Featured Post User most voted post
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
An Observatory Report from the Europol Innovation Lab Today, threat actors are using disinformation campaigns and deepfake content to misinform the public about events, to influence...
Banking & Finance CISO2CISO Notepad Series Cyber Attacks Cybersecurity Resource Guide Executive Cyber Security Resource Guide TOP Featured Post User most voted post
Cybersecurity 101 – A Resource Guide for BANK EXECUTIVES – Executive Leadership of Cybersecurity
INTRODUCTIONCybersecurity experts expect the trend toward increasingly sophisticated cyber-attacksto continue in the near future. And the financial services industry, a vital component of the nation’s critical...
CISO2CISO Notepad Series Cyber Attacks Cybersecurity Trends Reports Ransomware Trends Report User most voted post
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency Response Team
IntroductionIn 2021, although the main threat trends remained, our service approach moved to near-complete – 98% of all cases – remote delivery. Kaspersky Digital Forensics and...
Cisco Talos shares insights related to recent cyber attack on Cisco
UPDATE HISTORY DATE DESCRIPTION OF UPDATES Aug. 10th 2022 Adding clarifying details on activity involving active directory. Aug. 10th 2022 Update made to the Cisco Response...
Threat Hunting for Dummies
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time...
The 116 Best Cybersecurity Tools & Tactics 2021
If you want the best cybersecurity tools and tactics all in one place, you will love this guide.Below are the best 116 tools and tactics to...
Top 50 Security Threats by Splunk
Like you, cybercriminals are on their own digital transformation journey. Trends like remote work, Internet of Things (IoT), bring-your-own-device (BYOD) and cloud initiatives have given hackers...
securityaffairs – LockBit ransomware gang claimed to have hacked Bridgestone Americas, one of the largest manufacturers of tires
security affairs LockBit ransomware gang claimed to have compromised the network of Bridgestone Americas, one of the largest manufacturers of tires, and stolen data from the...
thehackernews – FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
The Hacker News The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint advisory warning that Russia-backed...
the register – LokiLocker ransomware family spotted with built-in wiper
BlackBerry says extortionists erase documents if ransom unpaid The Register BlackBerry security researchers have identified a ransomware family targeting English-speaking victims that is capable of erasing...
cisomag – Global Affairs Canada Hit by Cyberattack
While the officials did not mention the attackers behind the security incident on Global Affairs Canada, a probe had been initiated to investigate the cyberattack. CISOMAG...