No doubt that every hacker has already heard of Digi-Key, the electronic component distributor that makes it just as possible to order one of something as it is to order a thousand of it. As an essential business, Digi-Key has been open during the duration of the lockdown since they …read more
It’s one of the enduring images of a humanitarian aid mobilization: military transport planes lined up on runways, ready to receive pallets of every conceivable supply. The cardboard boxes on those shrink-wrapped pallets are filled with everything from baby formula to drinking water, and will join crates filled with the …read more
A “disruption” to Japanese carmaker Honda’s computer network forced the company to cancel some production operations on Monday, according to a company spokesperson. The incident occurred Sunday and Honda’s IT personnel are still responding to the situation, Honda spokesman Chris Abbruzzese told CyberScoop. He declined to answer questions on the cause of the incident or where it was affecting the company geographically. But another statement from Honda to the BBC said the incident has “also [had] an impact on production systems outside of Japan.” Cybersecurity researchers said that malicious software samples associated with the incident suggested a ransomware attack had occurred. Vitali Kremez, a strategic adviser to cybersecurity company SentinelOne, said he suspected a strain of ransomware known as Snake or EKANS was the cause of the incident. The ransomware appears to have been coded to check that it was on Honda’s networks before executing, Kremez said. EKANS ransomware emerged last […]
The post Computer network ‘disruption’ forces Honda to cancel some production appeared first on CyberScoop.
The landscape shifts quickly, but managed services providers enable organizations to repurpose full-time staff members from impacted operations to more strategic product lines or initiatives. Continue reading How startups can leverage elastic services for cost optimization
Hackers often plant their malicious software on computers in stages. One piece of code can be a foothold onto a network, another delivers the malware, and yet another executes it to steal or manipulate data. But looks can be deceiving. The same code used as a staging tool in one attack might be the tip of the spear in another. For targeted organizations, spotting the difference can mean saving your data. That’s the case with a malicious program that has been used in hacking attempts against multiple economic sectors in the U.S. and Germany in the last six months, according to research published Thursday by security company Cybereason. About 150 organizations in the financial, retail, manufacturing, and health care sectors have been targeted by the Valak malware since it emerged late last year, the researchers said. More than just a “loader” that delivers malicious code, Valak can also be used […]
The post ‘Valak’ gives crooks flexibility in multi-stage malware attacks appeared first on CyberScoop.
A while back, I sat in the newish electric car that was the pride and joy of a friend of mine, and had what was at the time an odd experience. Instead of getting in, turning the key, and driving off, the car instead had to boot up.
The feeling …read more
When malicious code spread through the networks of Rheinmetall Automotive last year, it disrupted the German manufacturing firm’s plants on two continents, temporarily costing up to $4 million each week. The attacks were the latest reminder to factory owners that computer viruses can hobble production. While awareness of the threats has grown, there’s still a risk that too many organizations view such attacks as isolated incidents, rather than the work of a determined attacker that could be visited upon them. Federico Maggi, a senior researcher at cybersecurity company Trend Micro, set out to dispel that mindset. So he used a laboratory housed at Politecnico di Milano School of Management, Italy’s largest technical university, to show how attackers could disrupt production on the factory floor. His goal was to use the hypothetical hacks to help organizations address weaknesses in their defenses before actual attackers strike. “We wanted to look for something different, something that future attackers […]
The post How two researchers used an app store to demonstrate hacks on a factory appeared first on CyberScoop.
What was once the offshoot of a Formula One team is now forging quite a separate path for itself. Williams Advanced Engineering is channeling its Formula E experience to focus quite heavily on two pillars: lightweighting and electrification, in the aut… Continue reading Williams Advanced Engineering teases low-cost lightweight composites
The Department of Defense (DoD)’s Cybersecurity Maturity Model Certification (CMMC) is the newest iteration of the DoD’s effort to protect controlled unclassified information (CUI) the defense industrial base (DIB) and the DoD’s … Continue reading Cybersecurity Maturity Model Certification Domains Explained
When it comes to manufacturing, sheet metal and injection molding make the world go ’round. As a manufacturing method, injection molding has its own range of unique design issues and gotchas that are better to be aware of than not. To help with this awareness, [studiored] has a series of …read more