Your one-stop web resource providing safety and security information to manufacturers

Research

Decades Before Deepwater Horizon Oil Degrades

Golf ball-size gobs of weathered crude oil originating from the 2010 Deepwater Horizon disaster could remain buried in sandy Gulf Coast beaches for decades, according to a new study. These large clumps of oil and sand — called sediment-oil-agglomerates …

Small Businesses Feel Brunt of Breaches

Small businesses are not immune to cyber attacks as 36 percent of them have been victims of data breaches so far in 2019, a new report found. While data breaches remain an area of concern for businesses of all sizes, the survey revealed small businesse …

Threats Keep Coming as Attack Surface Grows: Report

The first six months of 2019 saw organizations dealing with a broad range of incoming threats and, more urgently, tackling threats that had already gained a foothold in their systems. Malware that “lived off the land,” or took advantage of legitimate a …

WS-Discovery Protocol Attacks can Lead to Huge DDoS

Attackers can abuse the Web Services Dynamic Discovery (WS-Discovery) protocol to launch massive distributed denial of service (DDoS) campaigns, researchers said. Warnings went out after researchers saw attackers abuse the WS-Discovery protocol in diff …

Process Safety Stuck in a Rut: Report

Safety is an executive level priority for their organizations, but execs admit to not doing enough to proactively manage process safety consistently, a new report found. The report uncovers challenging circumstances that keep organizations locked in th …

Users Still Operate Unsupported OSes

Nearly 41 percent of users still employ unsupported or approaching end of support desktop operating systems (OS) like Windows XP or Windows 7, a new survey found. In addition, 40 percent of very small businesses (VSBs) and 48 percent of small, medium-s …

Automaton Security Looking to SOAR

Challenges facing security teams are common knowledge: An increase in alert volume, a stark security skills gap, piecemeal processes, and siloed tools. In a look at a broad array of industries, a new report looks at stages of the incident response life …

Q2 Ransomware Attacks Double from 2018

Ransomware is continuing its growth curve as 16,017 new ransomware modifications ended up discovered in the second quarter, including ones belonging to eight new malware families, researchers said. This is more than double the number of new samples det …

APT Slightly Alters Attack

An advanced persistent threat (APT) known as Cloud Atlas and as Inception has enhanced its attack repertoire with new tools that allow it to avoid detection through standard Indicators of Compromise (IoC). This updated infection chain has been spotted …

Phishing Emails from Legit Sites

Attackers are increasing their exploitation of registration, subscription and feedback forms on trusted company websites to insert spam content or phishing links into confirmation emails, a new report found. For the attackers, the goal is have emails o …

Attack Protection: Phishing Filters Weak

Technology companies could be doing much more to protect against threats posed by phishing, researchers said. However, users also need to make themselves more aware of the dangers to ensure potential scammers do not obtain access to personal or sensiti …

APT Attack Scenarios Take a Twist

Advanced persistent threat (APT) activity in the second quarter this year included a number of attacks targeting or originating in the Middle East and South Korea, a new report found. While the goal for many of these threats was focused on cyberespiona …

Q2 DDoS Attacks Up over Last Year

The number of distributed denial of service (DDoS) attacks grew by 18 percent in the second quarter compared to the same period last year, a new report found. In addition, application-layer attacks, which are more difficult to organize and protect agai …

Trying to Understand IIoT and Security

In the rush to jump into the digital age, Industrial Internet of Things (IIoT) devices are hitting the market in many cases with little or no security, or, in that same rush to implement IIoT, users are not applying defensive measures to safeguard agai …

Mirai Variant Hides C&C in Tor

Attackers are still continually developing and using versions of the Mirai malware. “Barely a month since discovering a new Miori variant, we found another new Mirai sample through our research,” said Makoto Shimamura of the Cyber Threat Research Team …

Security Solutions Installed, But Do They Work?

It is one thing to employ security technologies and the assumption is once you put them in, they are working to secure your environment. But are they? A just-released report found 53 percent of security experts admit they are in the dark about how well …

Hacking Group Creates Cyberespionage Attack

There is a new malware distribution technique from Russian-speaking threat actor, Turla, exposing the group for integrating their signature JavaScript KopiLuwak malware in a new dropper named Topinambour, researchers said. First spotted in early 2019 i …

Ransomware, Phishing Still Top Attacks: Report

Source: CyberScout Ransomware and phishing remain the leading forms of attack, and non-targeted attacks are on the rise, a new report found. When it comes to businesses, last year security provider, CyberScout’s clients experienced 176 reactive data br …

DNS Firewalls Could Cut 33% of Breaches: Report

Domain Name System (DNS) firewalls, also known as protective DNS, which are freely available and easy to install, could prevent 33 percent of cybersecurity data breaches from occurring, research from the Global Cyber Alliance (GCA) showed. DNS firewall …

Methane Emissions Much Higher than Stated

Emissions of methane from the industrial sector have been vastly underestimated, with plants reaching 100 times higher than the fertilizer industry’s self-reported estimate, researchers said. Using a Google Street View car equipped with a high-precisio …

Pin It on Pinterest