The nation-backed hacker group behind the TRITON/TRISIS malware attack is increasing its nefarious activity, putting critical infrastructure systems in danger of future cyber attacks, according to Dragos Security.
Podcast: Play in new window | Download (Duration: 41:18 — 47.3MB)Subscribe: Android | Email | Google Podcasts | RSSIn this episode of The Security Ledger Podcast (#96): with primary elections taking place in states across the United States in the coming weeks, we talk to John Dickson about how state elections offices have become the front line in a pitched battle with state-sponsored hackers – with the fate of a 240 year democracy hanging in the balance. Also: we talk about the looming threat posed by so-called “deep fake” videos that use computer manipulation to make famous celebrities appear to say nearly anything.
In light of increased and more sophisticated threats in the cybersecurity landscape, tech giants have vowed to get more serious about protecting their customers by working together through a new Cybersecurity Tech Accord. Thirty-four companies—including Microsoft, Oracle, HP, Facebook, Cisco, Nokia TrendMicro and others—have signed on to the accord, which was unveiled Tuesday at the RSA Conference taking place in San Francisco this week. Those signing on said it’s the largest-ever group to agree to band together in the fight against malicious attacks from cybercriminals and nation-states. Speaking at the conference at the unveiling of the accord, Microsoft’s President and Chief Legal Officer Brad Smith told attendees that the recent WannaCry and NotPetya malware attacks were a sign that cybersecurity events were taking a turn for the worse. “We need to get the governments of the world to stop targeting tech companies, stop targeting the electrical grid, the private sector, hospitals,” […]
Researchers have found a vulnerability in emergency-alert systems provided by ATI Systems that could put millions at risk by allowing hackers to sound false alarms or otherwise mislead the public in regards to warning of natural and man-made disasters in the United States.
Recent attacks on the third-party data system of several U.S. pipeline companies highlight the persistent need for better ways to secure industrial control systems (ICSs), particularly when third-party software is in use, security experts said.