Are attackers already embedded in U.S. critical infrastructure networks?

The threat of cyberattacks against critical infrastructure in the United States has evolved beyond data theft and espionage. Intruders are already entrenched in the nation’s most vital systems, waiting to unleash attacks. For instance, CISA has raised alarms about Volt Typhoon, a state-sponsored hacking group that has infiltrated critical infrastructure networks. Their goal? To establish […]

The post Are attackers already embedded in U.S. critical infrastructure networks? appeared first on Security Intelligence.

Continue reading Are attackers already embedded in U.S. critical infrastructure networks?

Why consumer drones represent a special cybersecurity risk

Cybersecurity staff at an East Coast financial services company last summer detected unusual activity on its internal Atlassian Confluence page originating inside the company’s network. The MAC address used locally belonged to an employee known to be currently using the same MAC address remotely, according to a security specialist named Greg Linares, who had secondhand […]

The post Why consumer drones represent a special cybersecurity risk appeared first on Security Intelligence.

Continue reading Why consumer drones represent a special cybersecurity risk

34M Records from 17 Companies Up for Sale in Cybercrime Forum

A diverse set of companies, including an adaptive-learning platform in Brazil, an online grocery service in Singapore and a cold-brew coffee-maker company, are caught up in the large data trove. Continue reading 34M Records from 17 Companies Up for Sale in Cybercrime Forum