Radiflow researchers discovered the malware attacking the OT network of a water utility company in order to mine the Monero cryptocurrency.
Failure to comply with U.K. gov't directive to bolster cybersecurity, infrastructure firms could face stiff fines
If they don't make the necessary moves to ratchet up cybersecurity and invest in proper safeguards, the newly appointed special-sector regulators could fine energy, transport, water and health companies as much as £17 million.
National Security Strategy stresses fortification of cyber defenses, paints Russia as malicious actor
The National Security Strategy document released by the Trump administration on Monday calls for the reinforcement of cyber defenses to protect government systems and critical infrastructure, as well as an improved response to attacks against such assets.
Local voting officials have officially adopted a charter for the newly formed Elections Government Sector Coordinating Council (GCC) - a key step following DHS' designation of elections systems as critical infrastructure.
Banks face a new hybrid threat from hackers that has already netted criminals a cool £30 million, according to a new report.
Last Thursday saw the official launch of the International Operation Technology Security Association (Iotsa) where John Noble, director of network management at the UK's NCSC called for industry cooperation and incident reporting.
Eight members of the National Infrastructure Advisory Council said Trump had given "insufficient attention" to cybersecurity threats.
The hackers responsible for breaching the systems of multiple U.S. energy operators since May 2017 employed a phishing scheme that used malicious attachments to download a template file via an SMB connection, in order to silently harvest credentials, according to a blog post from Cisco Talos.
Since May, foreign hackers have breached computer networks at 12 or more U.S. power plants, including nuclear facilities, prompting the FBI and DHS to issue an urgent amber warning to utility companies, according to reports.
Kaspersky further reported that 60 percent of NotPetya infections took place in Ukraine, while Russia experienced just over 30 percent.
The Lithuanian, Latvian and Estonian power grids have all been targeted by Russia undergoing a series of limited Distributed Denial of Service (DDoS) over the last few years that may be probing for weaknesses.
Approximately 3,000 unique industrial sites per year are randomly infected with generic malware, while attacks involving malware specifically designed to target industrial control systems are far less common, according to a study.
It's estimated that power companies in Russia suffered more than 350 serious cyber-attacks in 2016, a 50 percent increase on the previous year.
Researchers may have found a tenuous link between a cyberespionage organization's credentials-stealing trojan and the Shamoon hacking group that's been targeting Saudi energy companies with Disttrack disk-wiping malware.
Secretary of Homeland Security Jeh Johnson on Friday officially declared the U.S. electoral system as critical infrastructure.
The KillDisk disk-wiper program that was used in conjunction with BlackEnergy malware to attack Ukrainian energy utilities now includes a ransomware component, according to researchers at CyberX.
A network breach risk assessment of over 20 organizations found that 100 percent showed signs of traffic tunneling, DNS-related exfiltration and malformed protocols in outbound traffic - all indicators of attackers using evasion and exfiltration techniques.
Professional hackers infiltrated the systems of Germany-based industrial conglomerate ThyssenKrupp earlier this year, stealing intellectual property, research and secrets.
One of the best ways to test incident readiness is a tabletop exercise, a mock incident administered for senior leadership, IT, security, legal, corporate communications and business line readiness.
The BlackNurse DOS attack uses ICMP messages to clog up firewalls with traffic.
Officials with the Lansing Board of Water & Light publicly acknowledged on Tuesday that the utility paid $25,000 to regain control of its accounting and email systems in the days following an April 25 ransomware attack.
The DDoS attacks that shuttered the Dyn DNS service on Oct. 21 set a precedent that could disrupt the presidential election next week, according to a report from Imperva Incapsula.