After Covid-19, Zoom meetings will stay with us, but the extent of its use will decrease. In contrast, cyberattacks that rose during the pandemic are expected to increase.
After Covid-19, Zoom meetings will stay with us, but the extent of its use will decrease. In contrast, cyberattacks that rose during the pandemic are expected to increase.
Download here Waterfall’s latest eBook: "ICS/OT Ransomware in the Supply Chain: Learnings from attacks in 2020"
Last week, the city of Oldsmar, Florida experienced a cyberattack on its water system. While it is good news that the employees noticed the attack, it never should have happened in the first place. A new blog post from Michael Firstenberg
During the COVID-19 pandemic, cyber criminals have also adopted the work from home model, which increased the number of cyber crimes against organizations worldwide for financial gain. New blog post by Lior Frenkel
The year 2020 saw significant growth and evolution of ics cyber attacks with the precarious move to more remote operations due to the COVID-19 pandemic. Here are the top 10 most notable cyber attacks on industrial systems for 2020
Article by Andrew Ginter in Threatpost - Can Governments Defeat Nation-State Attacks on Critical Infrastructures?
Missed the latest Softprom webinar about the Top 20 Cyberattacks on ICS Control Systems? Catch up now and watch the full recording here
How would Iran launch a cyber retaliation? Would they fly operatives into the country, drive up to power plants and cut through barbed-wire perimeters with USB drives? No - they will use their zero-days and custom malware remotely, sipping coffee in the safety of their offices. Several jurisdictions
During 2019 a growing number of industrial facilities were targeted by a wide range of cyber-attacks. Here are a few of the most notable collected by Center for Strategic and International Studies (CSIS)
This infographic summarizes the "The Top 20 CyberAttacks On Industrial Control Systems" whitepaper. Click here to see the full infographic
"Even as railroads continue to roll out their positive train control solutions, one question remains front and center: Are the systems vulnerable to a cyber-attack? Can there be a safety issue?
Restoring trust in network information for cyber-attack response teams and forensics”.