Data-driven analysis of vulnerabilities in real-world OT networks

Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and environmental safety, according to CyberX. Many are exposed to the public internet and easy to traverse using simple vulnerabilities like plain-text passwords. Lack of even basic protections can enable attackers to quietly perform reconnaissance before sabotaging physical processes. As a result, once attackers get into an OT network — either via … More Continue reading Data-driven analysis of vulnerabilities in real-world OT networks

Spies used malware to eavesdrop on Ukrainian businesses and media, researchers say

Security researchers have found that a mysterious hacking group is spying on dozens of Ukrainian businesses by infecting their computers with highly sophisticated malware that allows for eavesdropping and data exfiltration. The espionage campaign successfully compromised at least 70 victims, according to research published Wednesday by threat intelligence firm CyberX. Dubbed BugDrop, the clandestine hacking collective […]

The post Spies used malware to eavesdrop on Ukrainian businesses and media, researchers say appeared first on Cyberscoop.

Continue reading Spies used malware to eavesdrop on Ukrainian businesses and media, researchers say

Spies used malware to eavesdrop on Ukrainian businesses and media, researchers say

Security researchers have found that a mysterious hacking group is spying on dozens of Ukrainian businesses by infecting their computers with highly sophisticated malware that allows for eavesdropping and data exfiltration. The espionage campaign successfully compromised at least 70 victims, according to research published Wednesday by threat intelligence firm CyberX. Dubbed BugDrop, the clandestine hacking collective […]

The post Spies used malware to eavesdrop on Ukrainian businesses and media, researchers say appeared first on Cyberscoop.

Continue reading Spies used malware to eavesdrop on Ukrainian businesses and media, researchers say