Automotive hose manufacturer hit by ransomware, shuts down production control system

A US subsidiary of Nichirin Co., a Japan-based company manufacturing and selling automotive hoses and hose parts, has been hit with ransomware, which resulted in the shut down of the subsidiary’s network and production control system. What happen… Continue reading Automotive hose manufacturer hit by ransomware, shuts down production control system

Ransomware attacks keeping the educational sector on its toes

Financially motivated cybercriminals are taking advantage of schools’ need for uptime, their scarcity of cybersecurity defense resources, and lack of expertise compared to other potential targets. In fact, during 2021 in the U.S. alone over 1,000 schoo… Continue reading Ransomware attacks keeping the educational sector on its toes

Ransomware wreaked havoc last year, manufacturing was most targeted

IBM Security released its annual X-Force Threat Intelligence Index unveiling how ransomware and vulnerability exploitations together were able to “imprison” businesses in 2021 further burdening global supply chains, with manufacturing emerging as the m… Continue reading Ransomware wreaked havoc last year, manufacturing was most targeted

The Weaponization of Operational Technology

Given the accelerating rise in operational technology (OT) threats, this blog will address some of the most common threats IBM Security X-Force is observing against organizations with OT networks, including ransomware and vulnerability exploitation. IBM will also highlight several measures that can enhance security for OT networks based on insights gained from the X-Force Red […]

The post The Weaponization of Operational Technology appeared first on Security Intelligence.

Continue reading The Weaponization of Operational Technology

YubiKey Bio Series supports fingerprint recognition for passwordless and second factor logins

Yubico launched YubiKey Bio Series, the first YubiKey series that supports fingerprint recognition for secure passwordless and second factor logins. Built for biometric authentication on desktops, the YubiKey Bio Series supports modern FIDO2/WebAuthn a… Continue reading YubiKey Bio Series supports fingerprint recognition for passwordless and second factor logins

McAfee collaborates with IBM Security to bring integrated solution for TD SYNNEX customers

McAfee Enterprise collaborated with IBM Security to develop an integrated solution for TD SYNNEX customers that provides visibility, investigation, remediation and control to protect the global workforce. The TD SYNNEX security solution is available to… Continue reading McAfee collaborates with IBM Security to bring integrated solution for TD SYNNEX customers

Average total cost of a data breach increased by nearly 10% year over year

Data breaches now cost companies a total of $4.24 million per incident on average, according to the Cost of a Data Breach Report, conducted by Ponemon Institute and analyzed by IBM Security. Based on in-depth analysis of real-world data breaches experi… Continue reading Average total cost of a data breach increased by nearly 10% year over year

IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance

Open Cybersecurity Alliance (OCA) announced it has accepted IBM’s contribution of Kestrel, an open-source programming language for threat hunting that is used by Security Operations Center (SOC) analysts and other cybersecurity professionals. Kestrel s… Continue reading IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance

New infosec products of the week: May 7, 2021

Assessing third-party security controls with Panorays Smart Questionnaires Unlike manual security questionnaires, Smart Questionnaires include only the questions that are relevant for each supplier based on the business relationship context. Customers … Continue reading New infosec products of the week: May 7, 2021