article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. » And on and on.

article thumbnail

Feds Warn About Critical Infrastructure Ransomware Attacks, Vulnerabilities

eSecurity Planet

cybersecurity agencies, which highlighted the threats in a pair of warnings issued in recent days. Secret Service issued a detailed advisory on the BlackByte Ransomware as a Service (RaaS) group, which has attacked critical infrastructure industries in recent months, among them government, financial and food and agriculture targets.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sodinokibi ransomware gang launches auction site to sell stolen data

Security Affairs

Now the group implemented the new “auction” feature, a first auction is for documents stolen from a Canadian agricultural company that was hacked in May and that refused to pay the ransom. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. SecurityAffairs – ransomware, cybersecurity).

article thumbnail

Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee

The Security Ledger

With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee. Episode 215-1: Jeremy O’Sullivan of Kytch On The Tech Serving McDonald’s Ice Cream Monopoly Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture.

article thumbnail

Hunting the ICEFOG APT group after years of silence

Security Affairs

This week, Chi-en (Ashley) Shen presented at the CONFidence cybersecurity conference held in Poland her analysis on new samples of malware associated with the ICEFOG group. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. With the file-less ICEFOG-M, host-based detection for payloads are more difficult.

article thumbnail

HawkEye Keylogger is involved in attacks against business users

Security Affairs

. “ In April 2019, threat actors launched numerous campaigns aimed at targeting industries such as transportation and logistics, healthcare, import and export, marketing, agriculture, and others. . Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. ” continues the post. .

article thumbnail

CISA issues proposed rules for cyber incident reporting in critical infrastructure

Data Protection Report

On March 27, 2024, the Cybersecurity and Infrastructure Security Agency (“CISA”) published a Notice of Proposed Rulemaking for the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (“CIRCIA”), which imposes new reporting requirements for entities operating in critical infrastructure sectors.