Researchers reveal OT-specific malware in use and in development

Malware that’s made specifically to target industrial control systems (ICS), Internet of Things (IoT) and operational technology (OT) control devices is still rare, but in the last few weeks security researchers have identified two salient threat… Continue reading Researchers reveal OT-specific malware in use and in development

Organizations overwhelmed by numerous and insecure remote access tools

Organizations are combating excessive remote access demands with an equally excessive number of tools that provide varying degrees of security, according to Claroty. Data from more than 50,000 remote-access-enabled devices showed that the volume of rem… Continue reading Organizations overwhelmed by numerous and insecure remote access tools

Find out which cyber threats you should be concerned about

This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint | 2024 Voice of the CISO | May 2024 … Continue reading Find out which cyber threats you should be concerned about

Cybersecurity analysis exposes high-risk assets in power and healthcare sectors

Traditional approaches to vulnerability management result in a narrow focus of the enterprise attack surface area that overlooks a considerable amount of risk, according to Claroty. Organizations must take a holistic approach to exposure management To … Continue reading Cybersecurity analysis exposes high-risk assets in power and healthcare sectors

GISEC Global 2024 video walkthrough

In this Help Net Security video, we take you inside GISEC Global, which is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. The video features the following vendors: Sophos, Waterfall Security Solutions, UAE Cyber Security… Continue reading GISEC Global 2024 video walkthrough

Only 13% of medical devices support endpoint protection agents

63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices, clinical IoT devices, and surgery devices—have at least one known exploited vulnerability, according… Continue reading Only 13% of medical devices support endpoint protection agents

Claroty Advanced ATD Module provides continuous monitoring of healthcare network risks

Claroty released Advanced Anomaly Threat Detection (ATD) Module within the Medigate Platform from Claroty. The new capability provides healthcare organizations with the clinical context to properly identify, assess, and prioritize threats to connected … Continue reading Claroty Advanced ATD Module provides continuous monitoring of healthcare network risks

Unveiling the true cost of healthcare cybersecurity incidents

As healthcare organizations increasingly rely on interconnected systems, electronic health records, and telemedicine, the industry becomes a prime target for malicious actors seeking to exploit vulnerabilities. The consequences of a cybersecurity breac… Continue reading Unveiling the true cost of healthcare cybersecurity incidents

New insights into the global industrial cybersecurity landscape

In this Help Net Security video, William Noto, VP and Industry Principal for Claroty, discusses their recent global survey of 1,100 IT and OT security professionals who work in critical infrastructure sectors. When it comes to ransomware attacks, the i… Continue reading New insights into the global industrial cybersecurity landscape