Cybersecurity on the Move: Preventing Attacks on Shipping and Logistics

Something was very wrong at Forward Air on December 15, 2020. The company’s website was completely down. No one answered the customer service lines. Customers were waiting — and waiting — and waiting — for scheduled arrivals. And with all systems down, those customers had no way to get any information or track their packages. […]

The post Cybersecurity on the Move: Preventing Attacks on Shipping and Logistics appeared first on Security Intelligence.

Continue reading Cybersecurity on the Move: Preventing Attacks on Shipping and Logistics

Threat Actors’ Most Targeted Industries in 2020: Finance, Manufacturing and Energy

IBM Security’s annual X-Force Threat Intelligence Index uses data derived from across our teams and managed customers to gather insights about the topmost targeted industries every year, helping organizations manage risk and resource investment in their security programs. When it comes to managing digital risk and facing potential cyberattacks, each industry faces its own unique […]

The post Threat Actors’ Most Targeted Industries in 2020: Finance, Manufacturing and Energy appeared first on Security Intelligence.

Continue reading Threat Actors’ Most Targeted Industries in 2020: Finance, Manufacturing and Energy

A Secure Supply Chain Requires Independent Visibility Into Firmware

Once again, supply chain risks are in the news, with Bloomberg reporting attacks compromising servers via malicious firmware updates. While we don’t have many technical details about the attacks reported in the Bloomberg article, the risk associated wi… Continue reading A Secure Supply Chain Requires Independent Visibility Into Firmware

In the Shadow of Sunburst: Hunting for Firmware Persistence in the Context of Supply Chain Attack IR

Download the PDF > In the wake of the Sunburst attack, IR and threat hunting are more important than ever, and firmware should be a key part of these efforts. As organizations continue to uncover the magnitude of these events, it is time to conside… Continue reading In the Shadow of Sunburst: Hunting for Firmware Persistence in the Context of Supply Chain Attack IR

Threat actors’ dangerous and rising interest in the global energy industry

The energy sector is no stranger to digital transformation. Like so many industries before it, energy is currently in the midst of significant digital growth, thanks to developments in artificial intelligence (AI), the Internet of Things (IOT), blockch… Continue reading Threat actors’ dangerous and rising interest in the global energy industry

Water And Molten Aluminium Is A Dangerous Combination

It is not uncommon for a Hackaday writer to trawl the comments section of a given article, looking for insights or to learn something new. Often, those with experience in various fields will share kernels of knowledge or raise questions on a particular topic. Recently, I happened to be glazing …read more

Continue reading Water And Molten Aluminium Is A Dangerous Combination

Detecting SUNBURST/Solarigate activity in retrospect with Zeek – a practical example

Ben Reardon – Corelight Labs Researcher The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the SolarWinds pa… Continue reading Detecting SUNBURST/Solarigate activity in retrospect with Zeek – a practical example

Finding SUNBURST Backdoor with Zeek Logs & Corelight

John Gamble, Director of Product Marketing, Corelight FireEye’s threat research team has discovered a troubling new supply chain attack targeting SolarWind’s Orion IT monitoring and management platform. The attack trojanizes Orion software updates to d… Continue reading Finding SUNBURST Backdoor with Zeek Logs & Corelight