Securing the World’s Energy Systems: Where Physical Security and Cybersecurity Must Meet
Energy has become the new battleground for both physical and cyber security warfare, driven by nation-state actors, increasing financial rewards…
Energy has become the new battleground for both physical and cyber security warfare, driven by nation-state actors, increasing financial rewards…
A financially motivated threat actor tracked as Scattered Spider was observed attempting to deploy Intel Ethernet diagnostics drivers in a…
Security researchers are warning that patching critical vulnerabilities allowing access to the network is insufficient to defend against ransomware attacks.…
The Kinsing malware is now actively breaching Kubernetes clusters by leveraging known weaknesses in container images and misconfigured, exposed PostgreSQL…
Six malicious packages on PyPI, the Python Package Index, were found installing information-stealing and RAT (remote access trojan) malware while…
Air France and KLM have informed Flying Blue customers that some of their personal information was exposed after their accounts…
The U.S. Federal Communications Commission wants to strengthen federal law enforcement and modernize breach notification requirements for telecommunications companies so…
The hosting services provider shared new details on the breach that took down its Hosted Exchange Email service.
Check Point Research (CPR) releases new data on 2022 cyberattack trends. The data is segmented...
By Sami Mäkiniemelä, Chief Security Officer, Miradore It’s easy to identify security needs from physical threats we can […] The…