Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production.

Top AI trends to expect in manufacturing, agriculture and government

Information Management Resources

While it’s impossible to predict the future with certainty, technologies that incorporate AI and automation are maturing at an incredibly rapid rate across some industries.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Facebook links cyberespionage group APT32 to Vietnamese IT firm

Security Affairs

The APT32 group has been active since at least 2012, it has targeted organizations across multiple industries and foreign governments, dissidents, and journalists. The post Facebook links cyberespionage group APT32 to Vietnamese IT firm appeared first on Security Affairs.

“Edited by Laura Thornburgh,” Pioneer of Motion Picture Education

Unwritten Record

It might be surprising to learn that there was a time when the case had to be made for the value of motion pictures in education. It may require digging into the USDA’s textual records, but we hope they will be uncovered someday.

Alleged China-linked hackers used SolarWinds bug to breach National Finance Center

Security Affairs

Department of Agriculture, that provides human resources and payroll services to hundreds of federal agencies. Department of Agriculture, was among the affected organizations, raising fears that data on thousands of government employees may have been compromised.”

EU data governance regulation – a wave of digital, regulatory and antitrust reform begins – Part 1

Data Protection Report

On 25 November 2020, the European Commission ( EC ) published its proposed Data Governance Regulation (the DGR ), which will create a new legal framework to encourage the development of a European single market for data. In this first blog post, we outline key aspects of the DGR, set it in the context of other reforms proposed by the EC, consider public-sector data sharing under the DGR, and look at its potential impact on businesses.

Two more cyber attacks hit Israel’s water facilities in June

Security Affairs

One of the attacks hit agricultural water pumps in upper Galilee, while the other one hit water pumps in the central province of Mateh Yehuda. According to local media, the targets of the attacks were small drainage installations in the agriculture sector.

US Government Accountability Office Releases New Report On The Internet of Things (IoT)

Privacy and Cybersecurity Law

On May 15, 2017, the US Government Accountability Office (GAO) released a new report entitled “ Internet of Things: Status and implications of an increasingly connected world.” According to the GAO, the cost and size of electronics are decreasing, making it easier for the electronics to be embedded into objects and to be enabled as IoT devices. The network component of an IoT device connects it to other devices and to networked computer systems.

Chinese hackers stole info from Spanish centers working on Covid19 vaccine

Security Affairs

The cyberattack against Spanish research labs came from China, but it is not clear which is the nature of the information stolen. “A CSIC spokesperson said that no theft has occurred at its Madrid research centers.

Iranian hackers access unsecured HMI at Israeli Water Facility

Security Affairs

“The reservoir’s HMI system was connected directly to the internet, without any security appliance defending it or limiting access to it. The accessed system was secured by the administrators on December 2, but it was still exposed online.

Access 100

Israel announced to have foiled an attempted cyber-attack on defence firms

Security Affairs

The Israeli defence ministry announced on Wednesday that it had foiled a cyber attack carried out by a foreign threat actor targeting the country’s defence manufacturers. “no harm or disruption” was caused it added.

Remarkable Records: Wildlife Edition

The Texas Record

While we all have our own “favorites,” the twelve local government retention schedules include several series one might call “remarkable,” including this one: PW5550-03c WILDLIFE RECORDS Necropsy reports on dead marine mammals.

Spotlight: Dorothea Lange

Unwritten Record

However, among the holdings of the NARA Still Picture Branch, there are two main series where her photographs can be found: 83-G: Photographic Prints Documenting Programs and Activities of the Bureau of Agricultural Economics and Predecessor Agencies (ca.

JBS attack has likely a Russian origin

Security Affairs

On Sunday, May 30, JBS USA determined that it was the target of an organized cybersecurity attack, affecting some of the servers supporting its North American and Australian IT systems. Department of Agriculture.

Episode 221: Biden Unmasked APT 40. But Does It Matter?

The Security Ledger

But Does It Matter? Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture Episode 217: What Fighting Pirates Teaches Us About Ransomware. Or is it? It’s a tactic that experts note is designed as much as a message to foreign nations about the U.S.’s

Sodinokibi ransomware gang launches auction site to sell stolen data

Security Affairs

Sodinokibi ransomware operators are very active in this period, a few days after the gang has leaked the files allegedly stolen from the UK power grid middleman Elexon it has announced to launch an auction site to sell data stolen from victims that have chosen to not pay the ransom.

Another SolarWinds Orion Hack

Schneier on Security

Department of Agriculture, was among the affected organizations, raising fears that data on thousands of government employees may have been compromised. […].

Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo

Krebs on Security

In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. ” It remains unclear whether the stolen RDP credentials were a factor in this incident.

Australia: Consumer Data Right pipeline to cast a wide net

DLA Piper Privacy Matters

These sectors include: insurance (both general and health insurance); groceries; loyalty schemes; non-bank lenders; superannuation; transport; government; health; education; and. agriculture. Authors: Anthony Lloyd , Alex Horder. Background.

American food processing giant JBS Foods halts production after cyberattack

Security Affairs

“On Sunday, May 30, JBS USA determined that it was the target of an organized cybersecurity attack, affecting some of the servers supporting its North American and Australian IT systems. The company already notified the Australian government.

Episode 214: Darkside Down: What The Colonial Attack Means For The Future of Ransomware

The Security Ledger

Intel 471 CISO Brandon Hoffman joins us to to discuss Darkside, the ransomware group that attacked the Colonial Pipeline, why the crew may have bitten off more than it can chew and what the attack says about the state of America's Critical Infrastructure. government.

White House to Corporate America: Take Ransomware Threat Seriously

eSecurity Planet

companies urging them to take the ransomware threat more seriously as the Biden Administration ramps up its responses following recent attacks linked to Russia-based hacker groups on two major corporations. It was unclear whether JBS paid a ransom. government.

List of data breaches and cyber attacks in June 2020 ­– 7 billion records breached

IT Governance

The only saving grace for the organisation – which didn’t do itself any favours by initially denying the story and threatening to sue people who reported on it – is that the leaked database comprised a list of records from past data breaches.

Caretakers of the Sky: The Wright Brothers and Recording the Aerial Age

Unwritten Record

After successful tests on a five-foot biplane kite, it soon became obvious that the weather conditions at their home in Dayton were ill-suited for sustained experiments. It weighed nearly five times more than their 1902 glider, requiring a launching system to get it up to flying speed.

German Government Asks Internet Companies to Develop Self-Regulatory Code for Geo Data Services and Proposes Draft Law

Hunton Privacy

On September 20, 2010, the German government under the leadership of the Federal Minister of the Interior held a summit on “Digitization of Cities and States – Opportunities and Limits of Private and Public Geo Data Services.” Approximately 50 experts attended, including the Federal Minister of Food, Agriculture and Consumer Protection, the Federal Minister of Justice and representatives from various companies, such as Deutsche Telekom, Google, Microsoft, Apple Inc.,

List of data breaches and cyber attacks in November 2020 – 586 million records breached

IT Governance

Don’t pay ransom on the promise your data will be deleted, because it won’t be Almost 11 million patients impacted by Blackbaud incident – and still counting Ticketmaster fined £1.25 We recorded 103 cyber security incidents in November, which accounted for 586,771,602 leaked records.

Visual Cues and Clues: Looking ON the Photo

Unwritten Record

Moreover, sometimes you can track down the archival institution that houses a photo you found online or in a book by simply examining what markings you can find on it. If you’re looking for information on the photo, typically it will be marked in the corners or along the sides of the image.

Eggplant Activism: Philadelphia Community Gardens and COVID-19


The Pennsylvania Horticultural Society closed its headquarters in downtown Philadelphia and directed staff to work from home. Local and State government hadn’t included specific regulations for gardens in their closure orders.

A cyberattack took offline websites of the Georgia agency

Security Affairs

“The Administrative Office of the Courts was offline Monday as the state government tried to contain the hack.” ” At the time of writing, it wasn’t clear the extent of the attack in term of impacted Georgia courts and interference with ordinary operations. Everything is shut down until they tell us to turn it on,” Barclay said. “We’re The attack was discovered during the weekend, experts believe it was launched from a foreign country.

The Importance of “Legacy” in Colleges and Universities

Rocket Software

Unfortunately, that may be more accurate than we would like to admit—or than it should be. . North Carolina Central University, NC Agricultural and Technical State University, Alcorn State University, Tennessee State University and East Carolina University.

Hunting the ICEFOG APT group after years of silence

Security Affairs

The cyber mercenaries were recruited by governments and private companies, it was composed of highly skilled hackers able to conduct sophisticated attacks. The group of hackers went dark just after the Kaspersky shared findings of its investigation in September 2013. Both ICEFOG-P and ICEFOG-M are more complex of the original backdoor, a circumstance that suggests the threat actors have continued to develop and use it.

50 Years Makes a Difference! How Film Research Has Changed Since the 1972 Conference on Audiovisual Archives

Unwritten Record

You may have heard that the National Archives is partnering with the University of Maryland Cinema and Media Studies Program to present Films of State , an online conference on government-produced moving images (if not, check out my last blog post for more background).

The Internet of Things (IoT): Managing the Data Tsunami


Yet along that path there will be numerous obstacles to overcome – chiefly related to data privacy and governance. The Internet-of-Things has the potential to transform a range of industries – from automotive and agriculture through to healthcare, home appliances and insurance services. It has even prompted one long-established US operator to announce a landmark strategic decision that it will only sell interactive life insurance policies going forward.[1].

The Bureau of Indian Affairs – Photographs Finding Aid: A Closer Look

Unwritten Record

It is not necessary to type the full name of the Tribal Nation in order to return relevant results. 75-ID-91, Alexander Gardner Portraits of Tribal Delegations to the Federal Government, 1872-1872.

Unwrapping the Archives

The Texas Record

The State Archives house some of the most important records of Texas history within its stacks. It is beautiful to watch researchers walk into the archives room not knowing what they will find and walk out with a sense of connection to their past. – How heavy does it look?

Mobile Libraries: Culture on the Go

Unwritten Record

A similar mode of transporting reading material was active in Washington County, Maryland, in 1905, the first of its kind in the United States. government used bookmobiles to promote a concept known as “cultural diplomacy.” An Information Center’s library was its principal hub.

Spotlight: Happy Birthday, West Virginia

Unwritten Record

West Virginia officially became a state on June 20, 1863 and will celebrate its 157th birthday this year. The state was created when several northern Virginia counties were admitted to the Union during the Civil War after several years of petitioning the United States Government.

Telstra warns public trust will crumble unless access to data is limited

The Guardian Data Protection

Telco says diverse agencies accessing data through legal loophole need to follow the same process as law enforcement bodies Telstra has warned that public trust in the security of their data will be eroded if government agencies continue to be allowed access to it without appropriate authorisation.

Spotlight: Photographs Documenting the Civilian Conservation Corps (CCC)

Unwritten Record

It was signed just one month into Roosevelt’s presidency, making the CCC one of the earliest New Deal programs. According to John Salmond, author of The Civilian Conservation Corps, 1933-1942: A New Deal Case Study , “during its life span of nine years more than 2.5

EU: Competition policy in the digital era (Part 1)

DLA Piper Privacy Matters

Several months have now passed since in late March the European Commission published its Report “ Competition policy for the digital era ” (“ the Report “), a report co-authored by special advisors Jacques Crémer, Yves-Alexandre de Montjoye and Heike Schweitzer. It is only a report, not even guidelines, you might think.