Watch as Petra’s remarkable thermal bore cuts through undrillable rock

San Francisco startup Petra says its new contactless thermal drilling robot can make steady progress through the hardest rock on Earth – stuff that would normally destroy drilling equipment – so quickly and cheaply that it could make a lot of undergrou… Continue reading Watch as Petra’s remarkable thermal bore cuts through undrillable rock

Threats to ICS and industrial enterprises in 2022

In recent years, we have observed various trends in the changing threat landscape for industrial enterprises. We can say with high confidence that many of these trends will not only continue, but gain new traction in the coming year. Continue reading Threats to ICS and industrial enterprises in 2022

Ransomware Attacks against Water Treatment Plants

According to a report from CISA last week, there were three ransomware attacks against water treatment plants last year.

WWS Sector cyber intrusions from 2019 to early 2021 include:

  • In August 2021, malicious cyber actors used Ghost variant ransomware against a California-based WWS facility. The ransomware variant had been in the system for about a month and was discovered when three supervisory control and data acquisition (SCADA) servers displayed a ransomware message.
  • In July 2021, cyber actors used remote access to introduce ZuCaNo ransomware onto a Maine-based WWS facility’s wastewater SCADA computer. The treatment system was run manually until the SCADA computer was restored using local control and more frequent operator rounds.

Continue reading Ransomware Attacks against Water Treatment Plants

Suing Infrastructure Companies for Copyright Violations

It’s a matter of going after those with deep pockets. From Wired:

Cloudflare was sued in November 2018 by Mon Cheri Bridals and Maggie Sottero Designs, two wedding dress manufacturers and sellers that alleged Cloudflare was guilty of contributory copyright infringement because it didn’t terminate services for websites that infringed on the dressmakers’ copyrighted designs….

[Judge] Chhabria noted that the dressmakers have been harmed “by the proliferation of counterfeit retailers that sell knock-off dresses using the plaintiffs’ copyrighted images” and that they have “gone after the infringers in a range of actions, but to no avail — every time a website is successfully shut down, a new one takes its place.” Chhabria continued, “In an effort to more effectively stamp out infringement, the plaintiffs now go after a service common to many of the infringers: Cloudflare. The plaintiffs claim that Cloudflare contributes to the underlying copyright infringement by providing infringers with caching, content delivery, and security services. Because a reasonable jury could not — at least on this record — conclude that Cloudflare materially contributes to the underlying copyright infringement, the plaintiffs’ motion for summary judgment is denied and Cloudflare’s motion for summary judgment is granted.”…

Continue reading Suing Infrastructure Companies for Copyright Violations

Facebook robot crawls along power lines to deliver fiber optic cable

Although fiber optic internet cable has many advantages over metal cable, it frequently has to be distributed underground – this limits its usability. Facebook, however, has developed a robot that could wrap the cable around existing power lines.Contin… Continue reading Facebook robot crawls along power lines to deliver fiber optic cable

The Dark Side Of Package Repositories: Ownership Drama And Malware

At their core, package repositories sound like a dream: with a simple command one gains access to countless pieces of software, libraries and more to make using an operating system …read more Continue reading The Dark Side Of Package Repositories: Ownership Drama And Malware

Why Cloud storage Has Supplanted Standard Storage Methods

With the introduction of virtual memory in the technological world, many companies have stopped using local storage devices. They either use cloud storage devices or a hybrid mix of them. Continue reading to know more.
The post Why Cloud storage Has Su… Continue reading Why Cloud storage Has Supplanted Standard Storage Methods

Cyber Safety Education: Four Tips For Building Online Resilience

While it comes to cyber safety, one of the biggest issues teachers and parents face is ensuring that their pupils and children are protected from online dangers when they are not being actively watched. The answer is cyber safety education. We must equ… Continue reading Cyber Safety Education: Four Tips For Building Online Resilience