Remove Information Security Remove Manufacturing Remove Military Remove Privacy
article thumbnail

Russian military plans to replace Windows with Astra Linux

Security Affairs

Cyber security seems to subvert the globalization concept, governments are working to develop their own technology fearing possible espionage and sabotage activities of foreign states. The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. Pierluigi Paganini.

Military 109
article thumbnail

Security Affairs newsletter Round 392

Security Affairs

Cisco addressed several high-severity flaws in its products LockBit ransomware gang claims the hack of Continental automotive group 250+ U.S. Cisco addressed several high-severity flaws in its products LockBit ransomware gang claims the hack of Continental automotive group 250+ U.S. Follow me on Twitter: @securityaffairs and Facebook.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

France will not ban Huawei from its upcoming 5G networks

Security Affairs

In July, the French information security agency ANSSI announced that Huawei Technologies Ltd. Anyway, the French government will not allow the Chinese giant to provide equipment that will be used in protect military bases, nuclear installations and other sensitive and critical infrastructures.

IT 132
article thumbnail

The US Gov is testing high-altitude balloons for surveillance

Security Affairs

The US government is testing high-altitude balloons manufactured by Sierra Nevada to conduct surveillance over American soil. The high-altitude balloons are manufactured by Sierra Nevada Corporation, they will cover a large area in the United States’ Midwest. ” states The Guardian. ” states the authorization. .

article thumbnail

Feel Good Ukraine Tractor Story Highlights Ag Cyber Risk

The Security Ledger

CISA, the Cybersecurity and Infrastructure Security Agency, has warned repeatedly about the possibility of devastating Russian cyber attacks on U.S. and Western nations’ military support of Ukraine’s army. “(Deere) basically has remote desktop access to the equipment,” he told Security Ledger.

article thumbnail

List of data breaches and cyber attacks in February 2022 – 5.1 million records breached

IT Governance

In the midst of all this, organisations across Europe have reported delays as a result of alleged state-sponsored attacks – including Toyota’s Japanese plants and a kettle manufacturer in the Isle of Man.

article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

prohibition, mitigation) on any acquisition, importation, transfer, installation, dealing in, or use of ICTS that has been designed, developed, manufactured, or supplied by parties owned by, controlled by, or subject to the jurisdiction or direction of “foreign adversaries.” The risk factors include. Comments were due by April 28, 2021.