Your one-stop web resource providing safety and security information to manufacturers

Research

APT Slightly Alters Attack

An advanced persistent threat (APT) known as Cloud Atlas and as Inception has enhanced its attack repertoire with new tools that allow it to avoid detection through standard Indicators of Compromise (IoC). This updated infection chain has been spotted …

Phishing Emails from Legit Sites

Attackers are increasing their exploitation of registration, subscription and feedback forms on trusted company websites to insert spam content or phishing links into confirmation emails, a new report found. For the attackers, the goal is have emails o …

Attack Protection: Phishing Filters Weak

Technology companies could be doing much more to protect against threats posed by phishing, researchers said. However, users also need to make themselves more aware of the dangers to ensure potential scammers do not obtain access to personal or sensiti …

APT Attack Scenarios Take a Twist

Advanced persistent threat (APT) activity in the second quarter this year included a number of attacks targeting or originating in the Middle East and South Korea, a new report found. While the goal for many of these threats was focused on cyberespiona …

Q2 DDoS Attacks Up over Last Year

The number of distributed denial of service (DDoS) attacks grew by 18 percent in the second quarter compared to the same period last year, a new report found. In addition, application-layer attacks, which are more difficult to organize and protect agai …

Trying to Understand IIoT and Security

In the rush to jump into the digital age, Industrial Internet of Things (IIoT) devices are hitting the market in many cases with little or no security, or, in that same rush to implement IIoT, users are not applying defensive measures to safeguard agai …

Mirai Variant Hides C&C in Tor

Attackers are still continually developing and using versions of the Mirai malware. “Barely a month since discovering a new Miori variant, we found another new Mirai sample through our research,” said Makoto Shimamura of the Cyber Threat Research Team …

Security Solutions Installed, But Do They Work?

It is one thing to employ security technologies and the assumption is once you put them in, they are working to secure your environment. But are they? A just-released report found 53 percent of security experts admit they are in the dark about how well …

Hacking Group Creates Cyberespionage Attack

There is a new malware distribution technique from Russian-speaking threat actor, Turla, exposing the group for integrating their signature JavaScript KopiLuwak malware in a new dropper named Topinambour, researchers said. First spotted in early 2019 i …

Ransomware, Phishing Still Top Attacks: Report

Source: CyberScout Ransomware and phishing remain the leading forms of attack, and non-targeted attacks are on the rise, a new report found. When it comes to businesses, last year security provider, CyberScout’s clients experienced 176 reactive data br …

DNS Firewalls Could Cut 33% of Breaches: Report

Domain Name System (DNS) firewalls, also known as protective DNS, which are freely available and easy to install, could prevent 33 percent of cybersecurity data breaches from occurring, research from the Global Cyber Alliance (GCA) showed. DNS firewall …

Methane Emissions Much Higher than Stated

Emissions of methane from the industrial sector have been vastly underestimated, with plants reaching 100 times higher than the fertilizer industry’s self-reported estimate, researchers said. Using a Google Street View car equipped with a high-precisio …

Hacking Group Employs Steganography

A highly sophisticated cyberespionage campaign aimed at stealing information from South Asian diplomatic, government and military entities has been around for almost six years and had ties to other recent attacks detected in the region, researchers sai …

Dilemma of Unpatched Vulnerabilities: Report

What percentage of hardware and software assets on your network are discovered automatically?Source: Tripwire survey It is a manufacturer’s dilemma. Yes, there is a vulnerability, but no it can’t be patched because the process needs to keep running. Ho …

Manufacturing has Plethora of Mobile Security Tools

The number of secure access tools in use by sector.Source: IDG Connect on behalf of Pulse Secure The manufacturing Industry ranked mobile security, network access control (NAC) and Software Defined Perimeter (SDP) the tools best suited for a secure acc …

Banking Trojan Attacks Rise in Q1

Kaspersky detected 29,841 installation packages for mobile banking Trojans in the first quarter, almost 11,000 more than in Q4 2018, but less than Q2 and Q3.Source: Kaspersky Lab There has been a significant rise in malware designed to steal credential …

Fear, Anger Conjure Different Breach Reactions

Customers who feel afraid in the wake of a data breach care more about the size and scope of the breach than do angry customers, new research shows. In addition, a company’s stock price can be influenced by the size of the breach when the news coverage …

DDoS Attacks Growing Again: Report

The amount of distributed denial of service (DDoS) attacks during the first three months of 2019 increased by 84 percent, compared with the previous quarter, a new report found. More specifically, there was big growth in the amount of attacks that last …

Misconfigured System an Emerging Threat

It may be hard to think of a misconfigured system as a threat, but it can be the silent killer. To that point, publicly disclosed misconfiguration incidents increased 20 percent year-over-year, a new report found. While there was a rise in incidents, o …

Manufacturing, Energy Targeted Industries

Manufacturing and Energy comprise 16 percent of the most frequently targeted industries.Source: IBM X-Force Manufacturing and energy sectors appear in the top ten of industries most targeted by attackers, a new report found. The fifth-most targeted ind …

Pin It on Pinterest