Remove 2018 Remove Infrastructure Remove Malware Remove Security
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. In addition, the latest on the Androxgh0st malware. 1 - Critical infrastructure orgs warned about using Chinese drones Here’s a warning from the U.S.

article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Also, how to assess the cybersecurity capabilities of a generative AI LLM. And the most prevalent malware in Q4. 1 - NIST’s Cybersecurity Framework 2.0 1 - NIST’s Cybersecurity Framework 2.0 The Cybersecurity Framework at 10.and

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Window Snyder’s new startup Thistle Technologies raises $2.5M seed to secure IoT devices

TechCrunch

The Internet of Things has a security problem. The past decade has seen wave after wave of new internet-connected devices, from sensors through to webcams and smart home tech, often manufactured in bulk but with little — if any — consideration to security. Security veteran Window Snyder thinks there is a better way.

IoT 207
article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2018-0798.

Malware 73
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

critical infrastructure through exploitation of known vulnerabilities Background On February 8, Fortinet published an advisory (FG-IR-24-015) to address a critical flaw in FortiOS, its network operating system. and international agencies. CISA, NSA and FBI warns of pre-positioning by Volt Typhoon in U.S.

Malware 120
article thumbnail

Colonial Pipeline Ransomware Attack: How to Reduce Risk in OT Environments

Tenable

It's time for Operational Technology (OT) environments to pursue a more proactive approach to cybersecurity by making cyber maintenance as much of a routine practice as the mechanical maintenance of systems and equipment. Department of Homeland Security. Regulatory compliance does not equal security. Source: Colonial Pipeline.

article thumbnail

Extra Crunch roundup: ‘Nightmare’ security breach, Poshmark’s IPO, crypto boom, more

TechCrunch

– APRIL 22, 2018: A statue of Albert Gallatin, a former U.S. The breach of FireEye and SolarWinds by hackers working on behalf of Russian intelligence is “the nightmare scenario that has worried cybersecurity experts for years,” reports Zack Whittaker. But who will it enrich with its final pricing decision?”

Retail 263