Remove Authentication Remove Energy and Utilities Remove Events Remove Government
article thumbnail

PseudoManuscrypt, a mysterious massive cyber espionage campaign

Security Affairs

Kaspersky researchers reported that tens of thousands of devices belonging to industrial and government organizations worldwide have been hit by the PseudoManuscrypt spyware. Thus, we cannot say for certain whether the campaign is pursuing criminal mercenary goals or goals correlating with some governments’ interests.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

Security breaches in this sector can be incredibly disruptive to society and are attracting considerable attention from governments and regulatory bodies around the world. The threat of attacks against Critical National Infrastructure (CNI) – energy, utilities, telecommunications, and transportation – is now front of mind for many.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Energy and utility companies have been some of the most high-profile cyber attacks in recent memory, such as the May 2021 Colonial Pipeline attack or the Delta-owned Monroe Energy attack in November 2021. In 2020 alone, 79 ransomware attacks were conducted against government entities in the U.S., costing an estimated $18.88

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

As 2023 draws to an end and cybersecurity budgeting is nearly complete, it helps to consider the year’s events and try to predict next year’s trends. Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs.

article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Electric grid utilities are deploying smart meters to better correspond to consumers energy demands while lowering costs. The use of digital certificates to sign code, ensure mutual authentication of devices connected to corporate networks, and encrypt data traffic is a well-established and effective solution.

IoT 96
article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

As with the first version of NIST’s Cybersecurity Framework, all companies should review the new version, determine its potential utility, and consider adopting, adapting or comparing the new Framework for use within their own cyber ecosystems. Significantly, version 1.1 Significantly, version 1.1 vulnerability disclosure. and 1.1.