Computer network ‘disruption’ forces Honda to cancel some production

A “disruption” to Japanese carmaker Honda’s computer network forced the company to cancel some production operations on Monday, according to a company spokesperson. The incident occurred Sunday and Honda’s IT personnel are still responding to the situation, Honda spokesman Chris Abbruzzese told CyberScoop. He declined to answer questions on the cause of the incident or where it was affecting the company geographically. But another statement from Honda to the BBC said the incident has “also [had] an impact on production systems outside of Japan.” Cybersecurity researchers said that malicious software samples associated with the incident suggested a ransomware attack had occurred. Vitali Kremez, a strategic adviser to cybersecurity company SentinelOne, said he suspected a strain of ransomware known as Snake or EKANS was the cause of the incident. The ransomware appears to have been coded to check that it was on Honda’s networks before executing, Kremez said. EKANS ransomware emerged last […]

The post Computer network ‘disruption’ forces Honda to cancel some production appeared first on CyberScoop.

Continue reading Computer network ‘disruption’ forces Honda to cancel some production

How startups can leverage elastic services for cost optimization

The landscape shifts quickly, but managed services providers enable organizations to repurpose full-time staff members from impacted operations to more strategic product lines or initiatives. Continue reading How startups can leverage elastic services for cost optimization

‘Valak’ gives crooks flexibility in multi-stage malware attacks

Hackers often plant their malicious software on computers in stages. One piece of code can be a foothold onto a network, another delivers the malware, and yet another executes it to steal or manipulate data. But looks can be deceiving. The same code used as a staging tool in one attack might be the tip of the spear in another. For targeted organizations, spotting the difference can mean saving your data. That’s the case with a malicious program that has been used in hacking attempts against multiple economic sectors in the U.S. and Germany in the last six months, according to research published Thursday by security company Cybereason. About 150 organizations in the financial, retail, manufacturing, and health care sectors have been targeted by the Valak malware since it emerged late last year, the researchers said. More than just a “loader” that delivers malicious code, Valak can also be used […]

The post ‘Valak’ gives crooks flexibility in multi-stage malware attacks appeared first on CyberScoop.

Continue reading ‘Valak’ gives crooks flexibility in multi-stage malware attacks

Electric Vehicles Continue the Same Wasteful Mistakes That Limit Longevity

A while back, I sat in the newish electric car that was the pride and joy of a friend of mine, and had what was at the time an odd experience. Instead of getting in, turning the key, and driving off, the car instead had to boot up.

The feeling …read more

Continue reading Electric Vehicles Continue the Same Wasteful Mistakes That Limit Longevity

How two researchers used an app store to demonstrate hacks on a factory

When malicious code spread through the networks of Rheinmetall Automotive last year, it disrupted the German manufacturing firm’s plants on two continents, temporarily costing up to $4 million each week. The attacks were the latest reminder to factory owners that computer viruses can hobble production. While awareness of the threats has grown, there’s still a risk that too many organizations view such attacks as isolated incidents, rather than the work of a determined attacker that could be visited upon them. Federico Maggi, a senior researcher at cybersecurity company Trend Micro, set out to dispel that mindset. So he used a laboratory housed at Politecnico di Milano School of Management, Italy’s largest technical university, to show how attackers could disrupt production on the factory floor. His goal was to use the hypothetical hacks to help organizations address weaknesses in their defenses before actual attackers strike. “We wanted to look for something different, something that future attackers […]

The post How two researchers used an app store to demonstrate hacks on a factory appeared first on CyberScoop.

Continue reading How two researchers used an app store to demonstrate hacks on a factory

Williams Advanced Engineering teases low-cost lightweight composites

What was once the offshoot of a Formula One team is now forging quite a separate path for itself. Williams Advanced Engineering is channeling its Formula E experience to focus quite heavily on two pillars: lightweighting and electrification, in the aut… Continue reading Williams Advanced Engineering teases low-cost lightweight composites

Cybersecurity Maturity Model Certification Domains Explained

The Department of Defense (DoD)’s Cybersecurity Maturity Model Certification (CMMC) is the newest iteration of the DoD’s effort to protect controlled unclassified information (CUI) the defense industrial base (DIB) and the DoD’s … Continue reading Cybersecurity Maturity Model Certification Domains Explained

Gain An Understanding of Injection Molding’s Design Gotchas

When it comes to manufacturing, sheet metal and injection molding make the world go ’round. As a manufacturing method, injection molding has its own range of unique design issues and gotchas that are better to be aware of than not. To help with this awareness, [studiored] has a series of …read more

Continue reading Gain An Understanding of Injection Molding’s Design Gotchas

Clever Suction for Robot Arm Automates Face Shield Production

We’re certainly familiar with vacuum grabbers used in manufacturing to pick items up, but this is a bit different. [James Wigglesworth] sent in some renders and demo video (embedded after the break) of the Dexter robot arm and a laser cutter automatically producing face shields.

It’s a nice little bit …read more

Continue reading Clever Suction for Robot Arm Automates Face Shield Production

WorkClout shifts focus to manufacturing performance support and raises $2.3M seed

WorkClout, a graduate of the Y Combinator Winter 2019 cohort, announced today that it has shifted its focus from manufacturing automation to manufacturing performance support and has raised a $2.3 million seed round. The funding was led by Spider Capital with participation from Y Combinator, Liquid 2, Soma Capital, Pioneer Fund, Mehta Ventures and several […] Continue reading WorkClout shifts focus to manufacturing performance support and raises $2.3M seed