A spate of high-profile ransomware attacks shows that the Asia-Pacific region is squarely in the crosshairs of cybercriminal groups, and some fear that attackers are turning to smaller, regional businesses even less prepared to defend themselves. Expert weigh in on defensive strategies.
Dragos completed a Series D extension to help organizations address enhanced OT security requirements from regulators and cyber insurance providers. The money will allow Dragos to help EU businesses affected by updated cybersecurity directives requiring many smaller organizations to boost security.
The automotive industry is rapidly transforming, with connected and autonomous vehicles becoming increasingly prevalent. This surge in network-connected cars presents new cybersecurity challenges, as vehicles become more reliant on cloud infrastructure.
Download this whitepaper and explore how Fortinet fortifies the...
Asia's automotive industry is rapidly transforming, driven by the adoption of electric vehicles, advanced safety systems, automated driving, and connected cars. This transformation is creating new opportunities for economic growth and environmental sustainability. However, it also presents new challenges for...
In today's automotive manufacturing landscape, securing your operational technology (OT) networks is like steering through a maze of complexities. Manual cybersecurity processes, the merging of OT and IT networks, and a lack of transparency can make this journey daunting. Adding to the challenge, there's a shortage of...
The number of connected devices used in healthcare is growing as manufacturers constantly introduce new types of IoT equipment. The ever-evolving threat landscape is making it harder for many entities, particularly outpatient care providers, to keep up, said Justin Foster, CTO of Forescout.
IoT and OT devices, which include network-attached storage devices, hold valuable data that ransomware groups seek to compromise. NAS devices are often exposed on the internet and lack the robust security measures found in other endpoints, said Daniel dos Santos of Forescout Technologies.
The BlackCat group on Monday claimed responsibility for a ransomware attack on Japanese watchmaker Seiko, publishing samples of stolen data files as proof of its exploit. Seiko Group Corp. announced earlier this month that it had detected unauthorized users accessing of some of its servers.
Welcome to the webinar summarizing the survey: Industry-Specific
Endpoint Security Challenges in Manufacturing - And Strategies to
Alleviate Associated Risks. This survey was conducted in Q1 and 2 of 2023, and attracted 150
responses from senior cybersecurity professionals at
manufacturing operations globally....
Security researchers from Microsoft disclosed flaws in a software development kit used for industrial applications, warning that hackers could attempt remote code execution. The computer giant says the flaws are in the Codesys software environment developed by the Germany company of the same name.
Securing remote access and building an overall cybersecurity strategy should be approached like any other business decision. Advantages and associated risks must be reviewed. There are also many challenges, people, technologies, and processes to consider, which vary between and within industries. Despite these...
Legacy infusion pumps commonly available for purchase on the secondary market often contain wireless authentication and other sensitive data that the original medical organization owners failed to purge, warned researcher Deral Heiland, citing a recent study conducted by security firm Rapid7.
A ransomware attack has forced a California-based hospital chain to divert ambulances from its emergency rooms and cancel appointments for services. The group of 17 hospitals, 166 outpatient clinics and various doctor practices is still recovering after an IT systems shutdown.
A multistage malware campaign is targeting industrial organizations in Eastern Europe with the objective of pilfering valuable intellectual property, including data from air-gapped systems. Researchers at Kaspersky identified two campaigns it has attributed to the Beijing-aligned APT31 group.
Adoption of 5G is growing, but are businesses equipped to handle risks from this network? Two experts - Alex Ooi of Digital Nasional Berhad in Malaysia, and Anand R. Prasad of DNB and Deloitte in Japan - shared the risk factors to take into account and ways the telecom industry can prepare itself.