Your one-stop web resource providing safety and security information to manufacturers

Research

Q3 DDoS Attacks on Rise

Distributed Denial of Service (DDoS) attacks rose 30 percentage points in Q3 2019 as compared to the previous quarter, and also rose 32 percentage points when compared to the same quarter last year, a new report found. The rise in 2019 Q3 DDoS attacks …

Europol Report on Spear Phishing

In terms of cybersecurity, spear phishing has been around pretty much from the beginning as an attack. The reason it has had stamina to last as long as security attackers have been around is very simple: It works. Along those lines, Europol’s European …

Breaches: Patches Available, but Not Applied

A majority of breaches that occurred in the past year were linked to a vulnerability where a patch was available, but not applied, new research found. In addition, despite a 24 percent average increase in annual spending on prevention, detection and re …

Companies Fare Better When Sharing Security Efforts

When one company suffers a cybersecurity breach, other companies in the same field also become less attractive to investors, a new study shows. However, companies open about their cybersecurity risk management fare significantly better than peers that …

APTs Ratchet Up Sophistication: Report

Advanced persistent threat (APT) activity in the third quarter shows an increase in the usage and number of new and previously unknown malicious toolsets, researchers said. This research highlights a consistent trend showing attackers are further diver …

Inside Attack Fears on Rise: Report

It is one thing to suffer a cyber attack from a nation state or outside force, but more often than not, fears are growing about assaults coming from within, including rogue employees and vendors. The percentage of technology executives who said state-s …

Industrial Firms Don’t Report Security Incidents: Report

More than two thirds (67 percent) of industrial organizations do not report cybersecurity incidents to regulators, a new report found. While remaining compliant in modern industrial business is a necessity and a driver for business investments, there a …

Utilities Remain Vulnerable to Attacks: Report

By Gregory Hale Over half of utilities reported at least one shutdown or operational data loss a year, a new report found. It goes to show with utilities increasingly adopting business models that connect OT power generation, transmission, and distribu …

New Malware Goes After HTTPS

There is a new malware that hijacks victims’ interactions with HTTPS web pages by patching the pseudo random number generator used in establishing an encrypted connection, researchers said. The Redcutor malware gives actors the ability to spy on users’ …

Cost of Enterprise Data Breach Rises

Attacks continue to increase and, accordingly, the cost of enterprise data breaches rose to $1.41 million, up from $1.23 million in the previous year, according to new research. In addition, enterprises invested more in cybersecurity in 2019, with IT s …

Energy Sector Feeling Attack Heat

Just a few short months ago in February, Japanese optics manufacturer HOYA suffered a cyberattack, which resulted in a partial shutdown of production lines at its key factory in Thailand. About 100 of the company’s computers were infected with malware …

F&B Sector Vulnerable to Cloud Attacks

With more applications, more data, and more information going to the cloud, you would think all industries would be cognizant of security. But are they? It appears food and beverage was one of the top sectors vulnerable to successful unauthorized login …

Data Hackers Steal in Breach

When hospitals are hacked, the public hears about the number of victims – but not all the information the cybercriminals stole. However, New research from Michigan State University (MSU) and Johns Hopkins University uncovered the specific data leaked t …

New Spy Tool Discovered

A previously unknown spy tool, which had been spotted in Indian financial institutions and research centers, was created by the Lazarus group and is being used to upload and download files to victims’ systems, record key strokes and conduct other actio …

Breaking Down Hacker’s Characteristics

If a child appears obsessed with video games and hanging out with questionable friends then he or she is showing common traits for involvement in cybercrime, among other delinquencies, new research found. Characteristics and gender-specific behaviors i …

Security or Innovation: A New Age Quandary

Innovation is key for any company to grow, but cybersecurity now has to be a part of the entire equation, which means companies are working to balance their desire to innovate with a need for a strong defense, a new report found. It also appears compan …

Decades Before Deepwater Horizon Oil Degrades

Golf ball-size gobs of weathered crude oil originating from the 2010 Deepwater Horizon disaster could remain buried in sandy Gulf Coast beaches for decades, according to a new study. These large clumps of oil and sand — called sediment-oil-agglomerates …

Small Businesses Feel Brunt of Breaches

Small businesses are not immune to cyber attacks as 36 percent of them have been victims of data breaches so far in 2019, a new report found. While data breaches remain an area of concern for businesses of all sizes, the survey revealed small businesse …

Threats Keep Coming as Attack Surface Grows: Report

The first six months of 2019 saw organizations dealing with a broad range of incoming threats and, more urgently, tackling threats that had already gained a foothold in their systems. Malware that “lived off the land,” or took advantage of legitimate a …

WS-Discovery Protocol Attacks can Lead to Huge DDoS

Attackers can abuse the Web Services Dynamic Discovery (WS-Discovery) protocol to launch massive distributed denial of service (DDoS) campaigns, researchers said. Warnings went out after researchers saw attackers abuse the WS-Discovery protocol in diff …

Pin It on Pinterest