manufacturing
Report: Manufacturing Remains Atop Cyberattack Leader Board
A report published today by Critical Start, a provider of managed cybersecurity services, finds cyberattacks in the first half of 2024 continued to focus on vertical industries that are rich in critical ...
Security Boulevard
Emulating the Politically Motivated North Korean Adversary Andariel – Part 2
Francis Guibernau | | adversary emulation, Agricultural, Andariel, Lazarus Group, manufacturing, North Korea, Operation Blacksmith, Professional Services
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the North Korean state-sponsored adversary Andariel during Operation Blacksmith which affected manufacturing, agricultural and physical security companies in multiple ...
Identity Security Is the Key to Managing Manufacturers’ Supply Chain Cyber Risk
What’s the weakest link in a manufacturer’s security architecture? One of the common answers is ‘the one you can’t control’, with third-party access being the most prominent example. Supply chain attacks are ...
How SBOM Data Enhances Cybersecurity and Response Operations
Deb Radcliff | | CodeSentry, embedded, manufacturing, Medical Devices, SBOM, software supply chain, TalkSecure Blog
By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube) At the RSA Security Conference (RSAC) last month, a multitude of vendors and speakers ...
Emulating the Long-Term Extortionist Nefilim Ransomware
Francis Guibernau | | adversary emulation, Broad-Based Attacks, Financial Services, manufacturing, Nefilim, RaaS, Ransomware, ransomware as a service, transportation
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the extortionist ransomware Nefilim during activities against multiple organizations, primarily based in North or South America, distributed in the ...
Gearing Up for a New Challenge: OT & IoT Security in the Automotive Industry
The automobile industry is increasingly becoming a target for cyber-attacks as vehicles evolve into sophisticated, connected systems. This transformation introduces vulnerabilities at multiple levels, from manufacturing processes to the vehicles themselves. Cyber ...
Emulating the Notorious Chinese State-Sponsored Winnti Group
AttackIQ has released three new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the stealthy and notorious Winnti Group during its activities in ...
Identity, Credential Misconfigurations Open Worrying Security Gaps
Nathan Eddy | | Active Directory, configuration, CVE, cyentia institute, EDR, endpoints, Energy, Financial Services, manufacturing, security exposure, Vulnerabilities, XM Cyber
A report found more than 40 million exposures are impacting 11.5 million critical business entities, with more than half related to cloud platforms ...
Security Boulevard
Industrial Enterprise Operational Technology Under Threat From Cyberattacks
One in four industrial enterprises had to temporarily cease operations due to cyberattacks within the past year, suggesting operational technology must improve ...
Security Boulevard
A Guide to Cybersecurity Compliance in the Manufacturing Sector
The manufacturing sector is one of the most extensive, exceptionally varied, and swiftly evolving segments of the global economy. As we walk through the third decade of the twenty-first century, we notice ...