Cybersecurity

Cybersecurity Threats & Attacks News

Given the sophistication of cyber-attacks, cybersecurity has become a central focus to protect people and their personal data. Learn more about the common cyber threats we all face in an age when companies are undergoing a digital transformation.

Top news of the week: 20.05.2022.

#Cybersecurity
#OT
#CELR
#ICS
#SCADA
#infosec
#CostaRica
#cyberattack
#ransomware
#mobile

Threats And Attacks

@USCERT_gov shared
On May 13, 2022
RT @ICSCERT: 🎉 We are excited to announce the launch of the NEW @INL interactive test site for #ICS and #OT. The Control Environment Laboratory Resource allows users to perform security research on #ICS and #SCADA systems. Visit https://t.co/HZMQ2hC5RI for details. #Cybersecurity #CELR https://t.co/pL38dLppBw
Open
Control Environment Laboratory Resource (CELR)

Control Environment Laboratory Resource (CELR)

The Control Environment Laboratory Resource (CELR) is an environment to experience the possible effects of kinetic cyber-physical attacks. CELR allows users to perform security research on ...

@unix_root shared
On May 18, 2022
Russian Conti #ransomware gang has threatened to overthrow the newly elected government of #CostaRica with a #cyberattack and has increased its ransom demand to $20 million in order to obtain a decryption key to unlock the hacked systems. Read: https://t.co/HrtkihjJOy #infosec
Open
Russian Conti Ransomware Gang Threatens to Overthrow New Costa Rican Government

Russian Conti Ransomware Gang Threatens to Overthrow New Costa Rican Government

Russian-speaking Conti ransomware gang has threatened to overthrow the newly elected government of Costa Rica with a cyberattack.

@EduardKovacs shared
On May 18, 2022
RT @SecurityWeek: The Vulnerable Maritime Supply Chain - a Threat to the Global Economy - https://t.co/w0LDFKcZFR https://t.co/a7jOHKAUd5
Open
The Vulnerable Maritime Supply Chain - a Threat to the Global Economy

The Vulnerable Maritime Supply Chain - a Threat to the Global Economy

An inside look at how merchant vessels and ports are extraordinarily vulnerable to increasingly sophisticated cyberattacks against unmanaged OT systems

@r0bertmart1nez shared
On May 19, 2022
Estoy feliz de compartirles que mi libro Incident Response with Threat Intelligence, publicado por .@PacktPub, ya está disponible para preventa en Amazon - https://t.co/ZLBpKsJ2DY y PacktPub - https://t.co/s6zljjiXBc.
Open
Incident Response with Threat Intelligence

Incident Response with Threat Intelligence

Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligence

@DarkReading shared
On May 18, 2022
RT @otherjimdonahue: "Offerings [on] the Dark Web have allowed threat actors to outsource their tools for attack, with prebuilt packages of scripts and tools facilitating anything from DDoS attacks to common vulnerability exploitation." Omer Carmi, @CyberSixgill. @darkreading https://t.co/5dLhxUT1zR
Open
How Threat Actors Are a Click Away From Becoming Quasi-APTs

How Threat Actors Are a Click Away From Becoming Quasi-APTs

As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.

@gcluley shared
On May 16, 2022
Russian cyber attack on Eurovision foiled by Italian authorities https://t.co/9r07qKc36h https://t.co/ZCtelx8tRf
Open
Russian cyber attack on Eurovision foiled by Italian authorities

Russian cyber attack on Eurovision foiled by Italian authorities

On Saturday, Italy hosted the Eurovision Song Contest in Turin to an estimated worldwide audience of nearly 200 million people as it was broadcast on TV and live-streamed online.

@TheHackersNews shared
On May 17, 2022
Are You Investing in Securing Your Data in the Cloud? Learn more: https://t.co/V9mZclqIkg #infosec #cybersecurity
Open
Are You Investing in Securing Your Data in the Cloud?

Are You Investing in Securing Your Data in the Cloud?

Gartner predicts that more than 95% of new digital workloads will continue to be deployed on cloud-native platforms by 2025.

@DarkReading shared
On May 19, 2022
6 Scary Tactics Used in Mobile App Attacks https://t.co/n146VzIHCH by @StormSwendsboe #mobile
Open
6 Scary Tactics Used in Mobile App Attacks

6 Scary Tactics Used in Mobile App Attacks

Mobile attacks have been going on for many years, but the threat is rapidly evolving as more sophisticated malware families with novel features enter the scene.