Funding Expires for Key Cyber Vulnerability Database – Krebs on Security

Funding Expires for Key Cyber Vulnerability Database – Krebs on Security

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking down. The federally funded, non-profit research and development organization MITRE warned today that its contract to maintain the Common Vulnerabilities and Exposures (CVE) program — which is traditionally funded each…

Read More
Why cyber attackers are targeting your solar energy systems — and how to stop them

Why cyber attackers are targeting your solar energy systems — and how to stop them

High energy costs and concerns over the stability and capacity of electric grids are leading businesses to evaluate and implement their own onsite energy generation systems. These onsite systems, referred to as distributed energy resources (DERs), are most commonly solar panel arrays, often paired with batteries to store energy for later use. DERs are usually…

Read More
OT/ICS cyber threats escalate as geopolitical conflicts intensify – Help Net Security

OT/ICS cyber threats escalate as geopolitical conflicts intensify – Help Net Security

Ransomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors use relatively unsophisticated tactics to infiltrate and disrupt industrial operations. State-sponsored groups embed themselves in…

Read More
Quantifying ROI: Understanding the impact of cybersecurity products and services on cyber insurance claims

Quantifying ROI: Understanding the impact of cybersecurity products and services on cyber insurance claims

Cyber insurance claim values are an effective way to quantify the impact of cyberattacks on organizations. A higher claim value indicates that the victim experienced considerable financial and operational consequences from the attack, while a low claim value reflects limited disruption.  Reducing the value of cyber insurance claims is to everyone’s advantage. For clients, lower…

Read More
Australian Cyber Security Centre Targets Bulletproof Hosting Providers To Disrupt Cybercrime Networks

Australian Cyber Security Centre Targets Bulletproof Hosting Providers To Disrupt Cybercrime Networks

Overview The Australian Cyber Security Centre (ACSC) has issued a detailed warning regarding Bulletproof Hosting Providers (BPH). These illicit infrastructure services play a critical role in supporting cybercrime, allowing malicious actors to conduct their operations while remaining largely undetectable. The Australian government’s growing efforts to combat cybercrime highlight the increasing difficulty for cybercriminals to maintain…

Read More