article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

These global events have also underscored the crucial significance of safeguarding our critical infrastructure against domestic or foreign attacks. It’s easy to envision the outcomes that could arise from a major assault on our vital infrastructure.

article thumbnail

Critical infrastructure is more vulnerable than ever—your industry could be a prime target

Lacework

One of the only major changes in cybercriminal operations is who their victims are—today, instead of targeting individuals, they’re targeting critical infrastructure. So, why did this shift occur, and which types of critical infrastructure are most at risk? Critical infrastructure is organized into 16 different sectors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Landmark EU Law Strengthens Cybersecurity of Critical Infrastructures

Palo Alto Networks

It is especially important in a time of growing geopolitical tensions and cyberattacks where European citizens and their economies depend on a stable and secure digital infrastructure. In addition, some malware is embedded in word documents, PDFs and other files that may include personal data.

article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Must Beware of China-backed Volt Typhoon, Cyber Agencies Warn

Tenable

The Volt Typhoon hacking gang is stealthily breaching critical infrastructure IT environments so it can strike on behalf of the Chinese government, cyber agencies say. critical infrastructure IT and operational technology security teams, listen up. Critical Infrastructure. ” Plus, ransomware gangs netted $1 billion-plus in 2023.

article thumbnail

Securing 5G for 2023 and beyond

CIO

For network operators, service providers, and equipment and solution providers, it’s no longer enough to secure voice and data across Layer 3 (network layer) and Layer 4 (transport layer) of the pipe. This includes advanced malware, command-and-control botnets, code injection, and application vulnerabilities. Radio rogues.

Security 256
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

critical infrastructure through exploitation of known vulnerabilities Background On February 8, Fortinet published an advisory (FG-IR-24-015) to address a critical flaw in FortiOS, its network operating system. Critical Infrastructure (AA24-038A) Join Tenable's Security Response Team on the Tenable Community.

Malware 122
article thumbnail

Cybersecurity: the linchpin of sustainable infrastructure

Capgemini

The global growth of smart technology is booming across homes, industries, cities, and infrastructure. Its ability to use big data, automate energy use, and create cost efficiencies means smart technology is becoming increasingly prevalent in national infrastructures. The attack on critical infrastructure. Real-world damage.