How secure are green data centers? Consider these 5 trends

As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers. KPMG found that the majority of the top 100 companies measure and report on their sustainability efforts. Because data centers consume a large amount of energy, Gartner predicts that by 2027, three in four organizations will have implemented […]

The post How secure are green data centers? Consider these 5 trends appeared first on Security Intelligence.

Continue reading How secure are green data centers? Consider these 5 trends

CloudFlare detected (and blocked) the biggest DDoS attack on record

The company said that the 5.6 Tbps attack is indicative of the steady increase in the size of these attacks.

The post CloudFlare detected (and blocked) the biggest DDoS attack on record appeared first on CyberScoop.

Continue reading CloudFlare detected (and blocked) the biggest DDoS attack on record

U.S. sanctions take aim at Chinese company said to aid hackers’ massive botnet

A joint takedown operation last year sought to disrupt Flax Typhoon’s compromise of hundreds of thousands of devices.

The post U.S. sanctions take aim at Chinese company said to aid hackers’ massive botnet appeared first on CyberScoop.

Continue reading U.S. sanctions take aim at Chinese company said to aid hackers’ massive botnet

Thousands of industrial routers vulnerable to command injection flaw 

The vulnerability, found in versions of Four-Faith routers, appears to have been exploited in the wild and has been connected to attempted infections of Mirai.

The post Thousands of industrial routers vulnerable to command injection flaw  appeared first on CyberScoop.

Continue reading Thousands of industrial routers vulnerable to command injection flaw 

Addressing growing concerns about cybersecurity in manufacturing

Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface. According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in […]

The post Addressing growing concerns about cybersecurity in manufacturing appeared first on Security Intelligence.

Continue reading Addressing growing concerns about cybersecurity in manufacturing

FBI joint operation takes down massive Chinese botnet, Wray says

Flax Typhoon targeted critical infrastructure in the U.S. and abroad and compromised hundreds of thousands of devices, the FBI director said.

The post FBI joint operation takes down massive Chinese botnet, Wray says appeared first on CyberScoop.

Continue reading FBI joint operation takes down massive Chinese botnet, Wray says

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon, a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China. Continue reading New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

FCC approves cybersecurity label for consumer devices

The U.S. Cyber Trust Mark aims to provide consumers with a better understanding of the security of their Internet of Things devices.

The post FCC approves cybersecurity label for consumer devices appeared first on CyberScoop.

Continue reading FCC approves cybersecurity label for consumer devices

Back to basics: Better security in the AI era

The rise of artificial intelligence (AI), large language models (LLM) and IoT solutions has created a new security landscape. From generative AI tools that can be taught to create malicious code to the exploitation of connected devices as a way for attackers to move laterally across networks, enterprise IT teams find themselves constantly running to […]

The post Back to basics: Better security in the AI era appeared first on Security Intelligence.

Continue reading Back to basics: Better security in the AI era