#critical-infrastructure

[ follow ]
#cybersecurity
Information security
fromITPro
2 months ago

94% of Wi-Fi networks are vulnerable to deauthentication attacks

94% of Wi-Fi networks are vulnerable to deauthentication attacks, highlighting security flaws in critical infrastructure.
Information security
fromITPro
2 months ago

300 days under the radar: How Volt Typhoon eluded detection in the US electric grid for nearly a year

The Volt Typhoon threat group accessed the US electric grid undetected for nearly a year, showcasing significant weaknesses in operational technology security.
Privacy professionals
fromDatabreaches
2 months ago

Swiss critical sector faces new 24-hour cyberattack reporting rule

Switzerland introduces a 24-hour reporting obligation for critical infrastructure cyberattacks to enhance national cybersecurity resilience.
Privacy professionals
fromITPro
2 months ago

CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted

CISA warns that Medusa ransomware has impacted over 300 critical organizations across various sectors, highlighting an increasing threat.
Information security
fromITPro
3 months ago

Wireless networks are a prime target for hackers - here's how to combat rising threats

Wireless networks are critically vulnerable, with only 6% adequately secured against cyber attacks.
Cyber threats pose significant risks to critical infrastructure, necessitating improved security measures.
The surge of new vulnerabilities and the significant number of alerts indicate a serious security crisis.
Information security
fromITPro
2 months ago

94% of Wi-Fi networks are vulnerable to deauthentication attacks

94% of Wi-Fi networks are vulnerable to deauthentication attacks, highlighting security flaws in critical infrastructure.
Information security
fromITPro
2 months ago

300 days under the radar: How Volt Typhoon eluded detection in the US electric grid for nearly a year

The Volt Typhoon threat group accessed the US electric grid undetected for nearly a year, showcasing significant weaknesses in operational technology security.
Privacy professionals
fromDatabreaches
2 months ago

Swiss critical sector faces new 24-hour cyberattack reporting rule

Switzerland introduces a 24-hour reporting obligation for critical infrastructure cyberattacks to enhance national cybersecurity resilience.
Privacy professionals
fromITPro
2 months ago

CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted

CISA warns that Medusa ransomware has impacted over 300 critical organizations across various sectors, highlighting an increasing threat.
Information security
fromITPro
3 months ago

Wireless networks are a prime target for hackers - here's how to combat rising threats

Wireless networks are critically vulnerable, with only 6% adequately secured against cyber attacks.
Cyber threats pose significant risks to critical infrastructure, necessitating improved security measures.
The surge of new vulnerabilities and the significant number of alerts indicate a serious security crisis.
fromSilicon Canals
2 weeks ago

Amsterdam's Optics11 reportedly raises 17M to protect sea-lanes, offshore infrastructure, and energy supply - Silicon Canals

Amsterdam-based Optics11 secures €17M to enhance fibre-optic technology for critical infrastructure amid increasing geopolitical tensions.
European startups
#power-outage
Privacy professionals
fromTechRepublic
1 month ago

3 Ways the UK Government Plans to Tighten Cyber Security Rules with New Bill

The U.K. Cyber Security and Resilience Bill aims to enhance protections against ransomware and update outdated cyber regulations.
#russia
World politics
fromwww.nytimes.com
5 months ago

Has Russia's Shadow Fleet, Built to Evade Sanctions, Added Sabotage to Its List?

Russia's shadow fleet poses a significant threat to Western infrastructure and security, particularly after the alleged sabotage of underwater cables.
World politics
fromwww.nytimes.com
5 months ago

Has Russia's Shadow Fleet, Built to Evade Sanctions, Added Sabotage to Its List?

Russia's shadow fleet poses a significant threat to Western infrastructure and security, particularly after the alleged sabotage of underwater cables.
fromTechRepublic
6 months ago

Software Makers Encouraged to Stop Using C/C++ by 2026

The Product Security Best Practices report emphasizes that software manufacturers should abandon memory-unsafe programming languages, particularly C/C++, to minimize risks associated with national security.
Information security
[ Load more ]