article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2017-0144.

Malware 74
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

In addition, the latest on the Androxgh0st malware. Cybersecurity and Infrastructure Security (CISA) agency and the Federal Bureau of Investigation (FBI) said this week. To mitigate this risk, the agencies recommendations include: Using drones built with secure-by-design principles, such as those manufactured in the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Dragos raises $110M Series C as demand to secure industrial systems soars

TechCrunch

Cybersecurity firm Dragos has raised $110 million in its Series C, almost triple the amount that it raised two years ago in its last round. Many companies were already trying to adapt with the digital age, but Lee said many companies realized they had underinvested in ICS security. A team photo of Dragos employees.

Industry 305
article thumbnail

The Future of Security

O'Reilly Media - Ideas

The future of cybersecurity is being shaped by the need for companies to secure their networks, data, devices, and identities. This includes adopting security frameworks like zero trust, which will help companies secure internal information systems and data in the cloud. Zero Trust Security.

Mobile 97
article thumbnail

Protecting Local Government Agencies with a Whole-of-State Cybersecurity Approach

Tenable

According to the Multi-State Information Sharing and Analysis Center (MS-ISAC), SLTT governments experienced more than 2,800 ransomware incidents from January 2017 through March 2021. Building a whole-of-state approach A “whole-of-state” approach enables state-wide collaboration to improve the cybersecurity posture of all stakeholders.

article thumbnail

Ransomware attacks against hospitals: A timeline

The Parallax

Hospitals and health care systems, now in the business of collecting patient data as a side effect of treating physical maladies, struggle to keep that information secure. Cybersecurity researchers at Cylance estimated that the number of ransomware attacks tripled in 2017. billion per year.

Security 154
article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Malware and antivirus software usually go together like tacos and pickles. READ MORE ON SECURITY AND GEOPOLITICS. Pretty much any software can be targeted to be ripped off,” says Mark Lechtik, a security researcher on the Check Point Malware Research Team who led the investigation into SiliVaccine.

Spyware 187