Industrial Espionage Campaign Uncovered

Data Breach Today

Kaspersky: 'MontysThree' Uses Detection Evasion Techniques A hacking group is taking aim at industrial targets in an ongoing cyberespionage campaign, security firm Kaspersky reports.

'ModPipe' POS Malware Attacking Hospitality Industry

Data Breach Today

Carefully Crafted Backdoor Targets Specific Oracle Software Used to Store Data A recently uncovered point-of-sale malware called "ModPipe" is targeting specific Oracle software used by thousands of restaurants and other businesses in the hospitality industry, according to researchers at ESET.

Sales 184
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Japanese Kawasaki Heavy Industries discloses security breach

Security Affairs

Japanese giant Kawasaki Heavy Industries discovered unauthorized access to a Japanese company server from multiple overseas offices. Kawasaki Heavy Industries disclosed a security breach, the company discovered unauthorized access to a Japanese company server from multiple overseas offices.

Energy industry 2021 predictions

OpenText Information Management

Mining companies, meanwhile, are … The post Energy industry 2021 predictions appeared first on OpenText Blogs. 2020 sent shock waves across oil and gas, utilities and mining organizations, creating dramatic shifts in supply and demand, revenue streams and productivity.

How to Overcome the Pain Points of Your CRM

When used effectively, a CRM can be the life blood of your sales team – keeping everyone organized, efficient, and at peak productivity. However, as a company, sales stack, and database grow, it becomes difficult to uphold structure and governance to keep a CRM up-to-date. The result? Less organization, more confusion, and fewer deals closed. Leveraging leading industry research from industry analysts, this eBook explores how your sales team can gain back valuable time.

How Ekans Ransomware Targets Industrial Control Systems

Data Breach Today

Researchers Identified Malware Variants With Advanced Capabilities Researchers with FortiGuard Labs have uncovered two samples of the Ekans ransomware strain that offer some additional insight into how the crypto-locking malware targets industrial control systems, according to a new report.

VPN Vulnerabilities Put Industrial Control Systems at Risk

Data Breach Today

Claroty Researchers Find Remote Access Tool Bugs Could Lead to Attacks Vulnerabilities in some VPNs used to remotely connect to industrial control systems could enable hackers to compromise large-scale industrial organizations, the security firm Claroty reports

Risk 169

Introducing OpenText Industrial Grid

OpenText Information Management

One topic that’s underpinned my blogs is the need for a secure IoT network to deliver on the promise of Industry 4.0. Failing to attest and secure IoT … The post Introducing OpenText Industrial Grid appeared first on OpenText Blogs. Business Network Enterprise World Industry IoT iiot industrial IoT OpenText Industrial Grid

'Disrupting the Hell Out of the Industry'

Data Breach Today

Tom Thimot and George Tubin of Socure say they are here to disrupt the industry Socure's Tom Thimot and George Tubin on Securing Identity As fraud has shifted over the past decade from basic account takeover to synthetic identities and new account fraud, so has the field of identity protection evolved.

A critical flaw in industrial automation systems opens to remote hack

Security Affairs

Experts found a critical flaw in Real-Time Automation’s (RTA) 499ES EtherNet/IP stack that could allow hacking industrial control systems. RTA’s ENIP stack is widely implemented in industrial automation systems. SecurityAffairs – hacking, industrial automation systems).

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

New Ransomware Targets Industrial Controls: Report

Data Breach Today

Dragos Researchers Describe Potential Threat Posed by Ekans Ransomware Ekans, a recently discovered ransomware variant that's designed to target industrial control systems, appears to have some of the same characteristics found in Megacortex, malware that struck several high-profile targets in 2019, according to the security firm Dragos

Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry

WIRED Threat Level

A campaign called Operation Skeleton Key has stolen source code, software development kits, chip designs, and more. Security Security / Cyberattacks and Hacks

Ripple20 Malware Highlights Industrial Security Challenges

Dark Reading

Poor security practices allowed software vulnerabilities to propagate throughout industrial and IoT products for more than 20 years

IoT 77

Multiple Industrial Control System Vendors Warn of Critical Bugs

Threatpost

Four industrial control system vendors each announced vulnerabilities that ranged from critical to high-severity.

82

How ZoomInfo Helps Overcome the Top Pain Points of Inside Sales

Recent digital transformation has shifted the B2B landscape by ushering in the era of buyer empowerment. With more access to user reviews, analyst opinion, and industry research, decision-makers are more informed than ever while navigating what is now known as the “buyer’s journey.”

Gangnam Industrial Style APT campaign targets industrial firms worldwide

Security Affairs

Experts discovered that at least 200 companies were the victims of a campaign, dubbed Gangnam Industrial Style, carried out by an advanced persistent threat (APT) group. Experts from the CyberX’s threat intelligence team Section 52 uncovered an ongoing cyberespionage campaign, tracked as Gangnam Industrial Style, that targeted industrial, engineering, and manufacturing organizations, most of them in South Korea (60%).

Achieving digital transformation in the insurance industry

OpenText Information Management

Digital … The post Achieving digital transformation in the insurance industry appeared first on OpenText Blogs. Customer Experience Management Digital Process Automation Digital Transformation Enterprise World Industry digital transformation digital transformation in insurance financial financial services financial services and insurance Insurance insurance industry Process Automation

Industrial Computer Maker Confirms Ransomware, Data Theft

Dark Reading

Advantech reports the stolen data was confidential but did not contain high-value documents

Industrial Cyberattacks Get Rarer but More Complex

Threatpost

Critical Infrastructure IoT Malware Most Recent ThreatLists attack volume building automation COVID-19 Cyberattacks first half 2020 gas Industrial Control Systems Kaspersky Oil ransomware Remote Desktop Protocol remote working the report work from home WormsThe first half of 2020 saw decreases in attacks on most ICS sectors, but oil/gas firms and building automation saw upticks.

IoT 76

The Impact of Direct Dials on Sales Productivity

Leveraging the latest industry research, this eBook highlights the impact of direct dial phone numbers on sales productivity with the goal of empowering reps to have more conversations with prospects, and consequently, schedule more meetings, increase opportunities, and close more business - fast.

Welcome to the era of the industrial cloud

OpenText Information Management

The industrial Internet of Things (IIoT) is having a profound effect on how manufacturing organizations share information. The explosion in connected industrial equipment means that companies have to think about how they archive sensor-based information coming from these devices, how they securely move this sensor data from one location to another, and how they derive … The post Welcome to the era of the industrial cloud appeared first on OpenText Blogs.

Driving innovation in the energy industry

OpenText Information Management

Worldwide demand for energy is growing faster than ever, leading to rapid changes in the energy industry and in the wider world beyond. PwC says the sector faces a “big change… [that] may … The post Driving innovation in the energy industry appeared first on OpenText Blogs. Industries UtilitiesDeloitte predicts companies in the oil and gas sector in 2020 will be “walking the tightrope,” and need to keep vigilant for both risks and opportunities.

NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug

Threatpost

Critical Infrastructure Government Hacks Vulnerabilities advisory alert CISA critical security vulnerability CVE-2020-7491 Cyberattacks factories foreign adversaries ICS-CERT Industrial Control Systems NSA oil and gas refineries power plants Schneider triconex warning

Critical Industrial Flaws Pose Patching Headache For Manufacturers

Threatpost

When it comes to patching critical flaws, industrial firms face various challenges - with some needing to shut down entire factories in order to apply updates.

Best Practices for a Marketing Database Cleanse

As frustrating as contact and account data management can be, this is still your database – a massive asset to your organization, even if it is rife with holes and inaccurate information. Entrusting a vendor to help maintain its accuracy and completeness is no ordinary engagement. Download ZoomInfo’s latest data-driven eBook aimed to help marketing leaders understand the best practices around choosing a B2B contact data provider.

Supporting the essential energy industry

OpenText Information Management

But there are some essentials that, even with all that we are … The post Supporting the essential energy industry appeared first on OpenText Blogs. Industries Utilities Oil & Gas Mobility mobile ContentIt’s an understatement to say that the world is living through a time of uncertainty. COVID-19 has forced us into a new normal that feels anything but familiar. We are coping, learning to go without, and making the best of what we have.

Cybercriminals Aim BEC Attacks at Education Industry

Dark Reading

Heightened vulnerability comes at a time when the sector has been focusing on setting up a remote workforce and online learning amid the pandemic

Your Garage Opener Is More Secure Than Industrial Remotes

Data Breach Today

Trend Micro Says It Moved Cranes Using RF Software Flaws Radio controllers used in the construction, mining and shipping industries are dangerously vulnerable to hackers, Trend Micro says in a new report. To address the issue, manufacturers need to move away from proprietary communication protocols and embrace secure standards, such as Bluetooth Low Energy

Mining 176

COVID-19: the implications for industries

OpenText Information Management

Also impacted are services where an interruption would endanger life, health or personal … The post COVID-19: the implications for industries appeared first on OpenText Blogs. Industries Covid-19The Coronavirus (COVID-19) outbreak is first and foremost a human tragedy, affecting hundreds of millions of people worldwide. It is also having a huge impact on the global economy, with most organizations being impacted – from an operations, customer and employee perspective.

IT 47

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Steganography Anchors Pinpoint Attacks on Industrial Targets

Threatpost

Critical Infrastructure Cryptography Malware Web Security ICS industrial targets Mimikatz Spear Phishing steganography suppliers targeted attacksOngoing spear-phishing attacks aim at stolen Windows credentials for ICS suppliers worldwide.

MontysThree threat actor targets Russian industrial organizations

Security Affairs

A previously unknown threat actor, tracked as MontysThree , composed of Russian speaking members targets Russian industrial organizations. “In summer 2020 we uncovered a previously unknown multi-module C++ toolset used in highly targeted industrial espionage attacks dating back to 2018.

Flaws in leading industrial remote access systems allow disruption of operations

Security Affairs

Experts found critical security flaws in two popular industrial remote access systems that could be exploited by threat actors for malicious purposes. SecurityAffairs – hacking, industrial remote access systems).

Key Industry 4.0 trends as the world emerges from COVID-19

OpenText Information Management

Even before COVID-19, Industry 4.0 The development of Industry 4.0 in … The post Key Industry 4.0 Industries Automotive & Manufacturing OpenText Worldtechnologies were beginning to have a major impact on the transformation of manufacturers worldwide.

Best Practices for Modern Records Management and Retention

Speaker: Sean Baird, Director of Product Marketing at Nuxeo

Documents are at the heart of many business processes. Organizations in highly regulated industries are realizing that traditional records management practices are insufficient and ineffective in today’s digital world. Join Sean Baird as he highlights best practices for effective records management and retention. He will explore how digital transformation can counteract the costs, inefficiencies, and end-user considerations that make it difficult to maintain compliance. He will highlight real-world successes and analyze the key strategies and technologies that help organizations find balance.

Protecting the Industrial Internet of Things

Data Breach Today

Asif Effendi of GE Oil and Gas Offers Risk Mitigation Insights The industrial internet of things presents a significant new risk paradigm, says Asif Effendi of GE Oil and Gas, who offers threat mitigation tips

Risk 131

The Industrial Internet of Things: Emerging Risks

Data Breach Today

Leading the latest edition of the ISMG Security Report: Chris Morales of the cybersecurity firm Vectra discusses how the industrial internet of things is changing the nature of industrial espionage and disruption

Risk 113

Critical Flaws in VNC Threaten Industrial Environments

Threatpost

Critical Infrastructure Vulnerabilities 37 Critical flaws industrial environments Kaspersky remote code execution virtual network computing VNC vulnerabilitiesSome of the bugs allow remote code-execution.

87

Critical Flaws in 3rd-Party Code Allow Takeover of Industrial Control Systems

Threatpost

Researchers warn of critical vulnerabilities in a third-party industrial component used by top ICS vendors like Rockwell Automation and Siemens.

86