Reflecting on three years of cyber warfare in Ukraine | Computer WeeklyThe Russian invasion of Ukraine has significantly transformed the global cyber security landscape, impacting tactics and frequency of cyber threats.
Despite attacks, water security standards still a pipe dreamMultiple countries are targeting U.S. water infrastructure, highlighting significant vulnerabilities in critical systems reliant on outdated technology.
Chinese threat actor resided in US electric grid for almost one yearThe Volt Typhoon intrusion highlights increasing cyberattack sophistication against critical infrastructure, stressing the need for foundational cyber defense capabilities.
Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT PlatformsIran-affiliated actors developed IOCONTROL malware targeting IoT and OT environments to compromise critical infrastructure in Israel and the US.
OT security: how AI is both a threat and a protectorOT attacks pose serious threats to critical infrastructure.Darktrace employs self-learning AI for real-time security solutions.
Always-on defense: The critical role of monitoring in manufacturing cyber protectionManufacturing's shift to interconnected systems under Industry 4.0 heightens vulnerability to cyber threats, necessitating improved cybersecurity measures.
Reflecting on three years of cyber warfare in Ukraine | Computer WeeklyThe Russian invasion of Ukraine has significantly transformed the global cyber security landscape, impacting tactics and frequency of cyber threats.
Despite attacks, water security standards still a pipe dreamMultiple countries are targeting U.S. water infrastructure, highlighting significant vulnerabilities in critical systems reliant on outdated technology.
Chinese threat actor resided in US electric grid for almost one yearThe Volt Typhoon intrusion highlights increasing cyberattack sophistication against critical infrastructure, stressing the need for foundational cyber defense capabilities.
Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT PlatformsIran-affiliated actors developed IOCONTROL malware targeting IoT and OT environments to compromise critical infrastructure in Israel and the US.
OT security: how AI is both a threat and a protectorOT attacks pose serious threats to critical infrastructure.Darktrace employs self-learning AI for real-time security solutions.
Always-on defense: The critical role of monitoring in manufacturing cyber protectionManufacturing's shift to interconnected systems under Industry 4.0 heightens vulnerability to cyber threats, necessitating improved cybersecurity measures.
CNI operators should ask these 12 questions of their OT suppliers | Computer WeeklyPrioritizing security in operational technology is essential for critical national infrastructure amid rising cyber threats.