
Where does Cybersecurity End for Electric Utilities?
Where does Cybersecurity End for Electric Utilities? Across the energy sector and between various electric sector locations there are several assets and systems deemed “crown jewel assets” or “mission-critical systems”. Depending on who you ask, nearly every digital...

A Common Password List Accounts for Nearly All Cyberattacks
A Common Password List Accounts for Nearly All Cyberattacks Half of a million passwords from the RockYou2021 list account for 99.997% of all credential attacks against a variety of honeypots, suggesting attackers are just taking the easy road. Tens of millions of...

New Windows UEFI Rootkit Black Lotus Advertised on Underground Criminal Forums
New Windows UEFI Rootkit Black Lotus Advertised on Underground Criminal Forums Cybersecurity researcher Scott Scheferman reported that a new Windows UEFI rootkit, dubbed Black Lotus, is advertised on underground criminal forums. The powerful malware is offered for...

Defend Against Malicious Actors’ Game Plan | Infographic
'Control System Defense: Know the Opponent' - published by the National Security Agency and the Cybersecurity & Infrastructure Security Agency - breaks down the steps malicious actors take to compromise critical infrastructure control systems so that you can...

Zeek is Now a Component of Microsoft Windows
Zeek is Now a Component of Microsoft Windows World’s leading open source network security monitoring platform now deployed on more than one billion global endpoints Corelight, the leader in open network detection and response (NDR), today announced the integration...

The Supply of Disinformation Will Soon Be Infinite
The Supply of Disinformation Will Soon Be Infinite Disinformation campaigns used to require a lot of human effort, but artificial intelligence will take them to a whole new level. Someday soon, the reading public will miss the days when a bit of detective work could...

3 Methods to Watch Logs in Real Time in Linux
3 Methods to Watch Logs in Real Time in Linux You know how to view files in Linux. You use cat command or probably less command for this purpose. That's good for files that has static content. But log files are dynamic and their content change with time. To monitor...

The Biggest Corporate Hacks 2021 | Infographic

Sweden Organized Cyber Exercise to Test Cyber Defenses
Military, government and corporate cyber defense experts participated in an exercise focused on protecting the internet infrastructure. Cyber exercises in Sweden simulating attacks on internet infrastructure are key to enhancing defenses as the country prepares to...