article thumbnail

FERC issues notice of proposed rulemaking to extend reporting requirements for cyberattacks targeting the energy sector

Data Protection Report

DHS’ webinar explained that the hackers obtained access to vendors providing computer services to electric utilities companies. These attacks trick victims into entering passwords and other personal information, giving hackers access to corporate networks. The hackers used tactics such as phishing emails and watering-hole attacks.

article thumbnail

The Week in Cyber Security and Data Privacy: 20 – 26 November 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Welcome to this week’s round-up of the biggest and most interesting news stories. Among those affected was SAP SE.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kali Linux Penetration Testing Tutorial: Step-By-Step Process

eSecurity Planet

Note that your pentest is not an exhaustive analysis, as you will likely have limited time and only need one working exploit to achieve your mission. You may use a VPN or install utilities to capture and forward traffic to other subnets, or configure proxychains. How to Install Kali Linux Kali Linux is remarkably easy to install.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers. Environmental effects caused by pollution.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

After receiving input from industry experts and doing my own analysis of the year’s driving forces, I identified five major cybersecurity trends. As we reduce the ability of hackers to access our data using weak passwords, the focus on solving the insider problem will become more pronounced.”

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Affected information includes users’ names, email addresses, IP addresses and encrypted passwords. The threat actor, KryptonZambie, listed a 5.93