(Photo by Joe Raedle/Getty Images) A shared password may be to blame for a hacker gaining remote access to a water treatment plant in Florida…
Tag: fbi
U.S. Cyber Weapons Were Leaked — And Are Now Being Used Against Us, Reporter Says – KPCW
In December 2020, a U.S. cybersecurity company announced it had recently uncovered a massive cyber breach. The hack dates back to March 2020, and possibly…
Big Russian hack used a technique experts had warned about for years. Why wasn’t the U.S. government ready? – The Washington Post
Cybersecurity researchers had warned for years that such an attack was possible. Those from one firm, FireEye, even released hacking tools in 2019 showing exactly…
5 Critical Questions Raised by Water Treatment Facility Hack – BankInfoSecurity.com
Critical Infrastructure Security , Endpoint Security , Governance & Risk Management Incident Highlights the Need to Enhance OT Security Scott Ferguson (Ferguson_Writes) • February 9,…
In Florida, a near-miss with a cybersecurity worst-case scenario – NBC News
A hacker broke into a Florida water treatment plant and ordered it to increase the amount of lye in the water to extremely dangerous levels,…
This is how vulnerable you are to cyber attacks because of the pandemic – Ladders
Security setups, identity verifications, passcodes. As annoying and intricate as the setup and process of it all can be, it exists to help us safeguard…
This cybersecurity threat costs business millions. And it’s the one they often forget about
While ransomware is the cyberattack most feared by businesses, another form of cybercrime is slipping under the radar, one that is proving highly lucrative for…
CSO’s guide to the worst and most notable ransomware
Ransomware has a long history, dating back to the late 1980s. Today, it’s generating billions of dollars in revenue for the criminal groups behind it.…
Supply Chain Cyber-Dangers for Small Government – GovTech
By now, everyone on the planet has probably heard about the massive supply chain breach that occurred when network management software from SolarWinds had malware…
What Qualifications Do You Need to Be a Penetration Tester? – EC-Council Official Blog – EC-Council Blog
The definition of penetration testing varies among experts. But most professionals agree that pen testing is a process of testing vulnerabilities in IT infrastructure by…