article thumbnail

A massive phishing campaign using QR codes targets the energy sector

Security Affairs

A phishing campaign employing QR codes targeted a leading energy company in the US, cybersecurity firm Cofense reported. “Beginning in May 2023, Cofense has observed a large phishing campaign utilizing QR codes targeting the Microsoft credentials of users from a wide array of industries.”

article thumbnail

Incentivizing public utilities to enhance cybersecurity: FERC’s proposed regulation

Data Protection Report

The ten in-scope standards cover a wide range of security areas, including training, protecting the perimeter, incident response, and supply chain. Consequently, the proposed regulation also incentivizes speed of the requests: the incentive would exist only while the cybersecurity measure was voluntarily. 8309-8325 (Feb. 5, 2021).).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FERC, NERC joint report on cyber incident response at electric utilities

Security Affairs

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best practices. Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) released a study on cyber incident response and recovery best practices for electric utilities.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

A major focus of cybersecurity as an industry is its efforts to detect, root out, and respond to potential fraudsters attempting to trick companies and people out of their money, data, or both. This made a lot of sense, especially in the earlier days of the Internet where cybersecurity measures were nowhere near as robust as they are today.

article thumbnail

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal

Security Affairs

These projects include tools, training programs, and a red team platform for exercising various types of offensive cyber operations, including cyber espionage, IO, and operational technology (OT) attacks.” The company was commissioned for the development of tools, training programs, and a hacking platform.

article thumbnail

Introducing the technology behind watsonx.ai, IBM’s AI and data platform for enterprise

IBM Big Data Hub

Data must be laboriously collected, curated, and labeled with task-specific annotations to train AI models. The emergence of transformers and self-supervised learning methods has allowed us to tap into vast quantities of unlabeled data, paving the way for large pre-trained models, sometimes called “ foundation models.”

article thumbnail

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

This escalation of reconnaissance is being closely monitored by the global cybersecurity and intelligence communities. Here are a few key things everyone should understand about the cybersecurity ramifications spinning out of the Soleimani assassination. Grimes, a data defense expert at cybersecurity training vendor KnowBe4.