article thumbnail

White hat hackers showed how to take over a European Space Agency satellite

Security Affairs

Thales cybersecurity researchers have shown this week how they seized control of a European Space Agency (ESA) satellite. Credit: ESA – European Space Agency The offensive cybersecurity team at Thales demonstrated how to take control of the ESA satellite, the is considered the world’s first ethical satellite hacking exercise.

article thumbnail

How to Ensure Your Digital Security During the Rugby World Cup

Thales Cloud Protection & Licensing

Sports fans aren’t the only ones who are looking forward to this event. It’s not like bad actors haven’t taken an interest in major sporting events before. That’s why it announced it would pursue two measures designed to strengthen its national digital security posture ahead of these sporting events.

Security 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recent events at the Innovation Hub

Archives Blogs

The Innovation Hub accomplishes an important part of NARA’s mission to make access happen through digitization, and also serves as an important event space to bring together both internal and external stakeholders for collaborative activities and cooperative learning. Photo courtesy of @wshs_applied_history. Photo by Catherine Brandsen.

article thumbnail

China-linked APT Volt Typhoon remained undetected for years in US infrastructure

Security Affairs

agencies fear the possibility that these actors could gain access to the networks of critical infrastructure to cause disruptive effects in the event of potential geopolitical tensions and/or military conflicts. .” U.S.

article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

These Russian cyber actors are government organizations and include other parties who take their orders from the Russian military or intelligence organizations – while not technically under government control. As the world watches the events in Ukraine, cyber incursions by hostile actors will continue across the globe.

article thumbnail

AIs as Computer Hackers

Schneier on Security

These days, dozens of teams from around the world compete in weekend-long marathon events held all over the world. In 2016, DARPA ran a similarly styled event for artificial intelligence (AI). There was a traditional human–team capture-the-flag event at DEFCON that same year. Inexplicably, DARPA never repeated the event.

article thumbnail

Cyber recovery vs. disaster recovery: What’s the difference? 

IBM Big Data Hub

While different—mainly due to the causes of the events they help mitigate—cyber recovery and DR are often complementary, with many enterprises wisely choosing to deploy both. Many small- and medium-sized businesses don’t have the resources to recover from a disruptive event that causes damage on that scale.