How the EU Cyber Resilience Act Impacts Manufacturers

December 12, 2023 at 02:04PM The EU Cyber Resilience Act requires manufacturers to prioritize security-by-design, enhancing global tech protocols. It places responsibility on manufacturers to ensure products are secure throughout their lifecycle, aiming for transparency in cybersecurity practices. Non-compliance could result in significant fines. This act will likely influence cybersecurity standards globally. Key Takeaways from … Read more

Nissan Restoring Systems After Cyberattack

December 7, 2023 at 08:54AM Nissan Oceania is actively working to recover its systems following a recent cyberattack. (14 words) Meeting Takeaways: – Nissan Oceania has experienced a cyberattack. – The company is currently in the process of restoring its systems following the incident. – Further updates on the situation can be found on the … Read more

Q&A: Lessons Learned From the Middle East’s National Cyber Drills

December 5, 2023 at 01:55PM During a National Cyber Drill in Qatar, 170 organizations were tested by the National Cyber Security Agency. Ethical hacker Suleyman Ozarslan explained that entities, especially from critical infrastructures such as government and finance, participate in cyber drills, which involve responding to simulated cyberattacks. Participation is voluntary, with drills organized by … Read more

Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats

December 1, 2023 at 06:24AM The DOJ and FBI partially dismantled the Qakbot malware network, shutting down command servers but not arresting operators, leaving a diminished risk. They advise using multi-factor authentication, employee training, software updates, strong passwords, network filtering, a recovery plan, and adherence to the “3-2-1” backup rule. Users can check for past … Read more

Ex-Cybersecurity Adviser to Bush, Obama Weighs in On Current Admin

November 29, 2023 at 06:33PM Former White House Cybersecurity Chief Melissa Hathaway, active in cybersecurity policy advisory, comments on the evolving digital threat landscape. She highlights ransomware sophistication, third-party supplier vulnerabilities, and underlines current administration efforts to make companies more security responsible. Hathaway also stresses the strategic digital advancements of China and expresses concerns over … Read more

Cyberattack on Pennsylvania Water Authority Disrupts OT Gear

November 29, 2023 at 05:36PM The Aliquippa Municipal Water Authority in Pittsburgh experienced a cyberattack by the Iranian-backed Cyber Av3ngers, targeting an Israeli-affiliated system and disrupting water pressure monitoring. Operations resumed manually; the water supply remains safe. The U.S. government is investigating, amid concerns about critical infrastructure cybersecurity and the need for proactive defense. Meeting … Read more

CISA Warns of Unitronics PLC Exploitation Following Water Utility Hack

November 29, 2023 at 08:36AM Hackers breached the Municipal Water Authority of Aliquippa’s ICS in Pennsylvania but didn’t compromise water safety. CISA linked the attack to the Cyber Av3ngers, possibly Iran-based, targeting an insecure Israeli-made Unitronics PLC. CISA advised stronger security measures for such systems given rising cyber threats to the water sector. **Meeting Takeaways:** … Read more

Five Cybersecurity Predictions for 2024

November 29, 2023 at 08:36AM In 2023, cybersecurity threats required organizations to strengthen their defenses amid a rise in credential compromise, ransomware, and hacktivism. The White House pushed for better vulnerability management. Going into 2024, Zero Trust adoption, ransomware preparedness, and advanced security awareness programs are key to contending with an evolving threat landscape. **Meeting … Read more

A bird’s eye view of your global attack surface

November 28, 2023 at 04:01AM Outpost24’s External Attack Surface Management (EASM) solution offers continuous mapping, analysis, and monitoring of an organization’s attack surface. It identifies vulnerabilities and provides recommendations on how to address them. The cloud-based solution requires no software installation and integrates with various applications to coordinate issue resolution. Outpost24 also provides a free … Read more

Maximize Cybersecurity Returns: 5 Key Steps to Enhancing ROI

November 21, 2023 at 10:04AM Organizations need to be proactive in defending against evolving cyber threats. The traditional approach of protecting the on-premises data center is no longer effective as more data is moved to the cloud. To maximize the value of cybersecurity investments, organizations should define objectives, conduct risk assessments, align cybersecurity goals with … Read more