article thumbnail

DoS attack the caused disruption at US power utility exploited a known flaw

Security Affairs

A DoS attack that caused disruptions at a power utility in the United States exploited a flaw in a firewall used in the facility. In May, the Department of Energy confirmed that on March 5, 2019, between 9 a.m. a cyber event disrupted energy grid operations in California, Wyoming, and Utah. ” states the NERC document.

article thumbnail

How AI is helping companies meet sustainability goals

IBM Big Data Hub

When I started a role as a leader for sustainability in Expert Labs , our professional technology services organization, I saw the potential for AI to help with energy efficiency, decarbonization , and waste reduction. Discover the current and emerging use cases for AI in waste management, optimization, energy reduction and ESG reporting.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations

Security Affairs

. “As early as 2022, APT28 actors had utilized compromised EdgeRouters to facilitate covert cyber operations against governments, militaries, and organizations around the world.” APT28 had utilized compromised Ubiquiti EdgeRouters as a command-and-control infrastructure for MASEPIE backdoors. ” reads the joint report.

article thumbnail

USB Drives shipped with Schneider Solar Products were infected with malware

Security Affairs

Both products are part of the solar energy offering of the vendor. Schneider revealed that the USB drives were infected with a malware during manufacturing at a third-party supplier’s facility. These USB removable media contain user documentation and non-essential software utilities. ” continues the advisory.

article thumbnail

IBM and business partner bring intelligent equipment maintenance to automotive company with IBM Maximo

IBM Big Data Hub

hereafter as Shuto Technology) to help a joint venture Original Equipment Manufacturer (OEM) in China to obtain information in an accurate and cost-effective way for on-site technicians. IBM® recently announced that it has worked with its business partner, Beijing Shuto Technology Co.,

article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

As with the first version of NIST’s Cybersecurity Framework, all companies should review the new version, determine its potential utility, and consider adopting, adapting or comparing the new Framework for use within their own cyber ecosystems. The redlined version is available here: [link]. Accordingly, version 1.1

article thumbnail

Coronavirus-themed campaign targets energy sector with PoetRAT

Security Affairs

Threat actors employed the previously-undetected PoetRAT Trojan in a Coronavirus-themed campaign aimed at government and energy sectors. . The malware infected ICS and SCADA systems used to control the wind turbines within the renewable energy sector. The messages used a document named “C19.docx,” Pierluigi Paganini.