Addressing growing concerns about cybersecurity in manufacturing

Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface. According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in […]

The post Addressing growing concerns about cybersecurity in manufacturing appeared first on Security Intelligence.

Continue reading Addressing growing concerns about cybersecurity in manufacturing

FBI joint operation takes down massive Chinese botnet, Wray says

Flax Typhoon targeted critical infrastructure in the U.S. and abroad and compromised hundreds of thousands of devices, the FBI director said.

The post FBI joint operation takes down massive Chinese botnet, Wray says appeared first on CyberScoop.

Continue reading FBI joint operation takes down massive Chinese botnet, Wray says

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon, a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China. Continue reading New 0-Day Attacks Linked to China’s ‘Volt Typhoon’

FCC approves cybersecurity label for consumer devices

The U.S. Cyber Trust Mark aims to provide consumers with a better understanding of the security of their Internet of Things devices.

The post FCC approves cybersecurity label for consumer devices appeared first on CyberScoop.

Continue reading FCC approves cybersecurity label for consumer devices

Back to basics: Better security in the AI era

The rise of artificial intelligence (AI), large language models (LLM) and IoT solutions has created a new security landscape. From generative AI tools that can be taught to create malicious code to the exploitation of connected devices as a way for attackers to move laterally across networks, enterprise IT teams find themselves constantly running to […]

The post Back to basics: Better security in the AI era appeared first on Security Intelligence.

Continue reading Back to basics: Better security in the AI era

Cyber experts applaud the new White House cybersecurity plan

First, there was a strategy. Now, there’s a plan. The Biden Administration recently released its plan for implementing the highly anticipated national cybersecurity strategy published in March. The new National Cybersecurity Strategy Implementation Plan (NCSIP) lays out specific deadlines and responsibilities for the White House’s vision for cybersecurity. The plan is being managed by the […]

The post Cyber experts applaud the new White House cybersecurity plan appeared first on Security Intelligence.

Continue reading Cyber experts applaud the new White House cybersecurity plan

Who and What is Behind the Malware Proxy Service SocksEscort?

Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks online advertisers and performs password-spraying attacks. Now new findings reveal that AVrecon is the malware engine behind a 12-year-old service called SocksEscort, which rents hacked residential and small business devices to cybercriminals looking to hide their true location online. Continue reading Who and What is Behind the Malware Proxy Service SocksEscort?

White House, FCC advance efforts to add security labels to connected devices

Smart devices have become a popular target for hackers due to lax industry security standards, something that the Biden program is hoping to turn around.

The post White House, FCC advance efforts to add security labels to connected devices appeared first on CyberScoop.

Continue reading White House, FCC advance efforts to add security labels to connected devices

Why Robot Vacuums Have Cameras (and What to Know About Them)

Robot vacuum cleaner products are by far the largest category of consumer robots. They roll around on floors, hoovering up dust and dirt so we don’t have to, all while avoiding obstacles.  The industry leader, iRobot, has been cleaning up the robot vacuum market for two decades. Over this time, the company has steadily gained […]

The post Why Robot Vacuums Have Cameras (and What to Know About Them) appeared first on Security Intelligence.

Continue reading Why Robot Vacuums Have Cameras (and What to Know About Them)