Search
System hacked
it-sa Special
In the increasingly digitalized industrial landscape, the challenges in cybersecurity have grown considerably in recent years. The increase in targeted cyberattacks on operational technology (OT), i.e. control systems, devices and components in production facilities, is particularly worrying. OT and IT must work closely together to ensure effective cybersecurity.
Flax Typhoon
Various cyber security agencies and authorities such as the FBI, the Cyber National Mission Force (CNMF), the NSA and the NCSC have uncovered a botnet with more than 260,000 devices worldwide.
Ad
Sowing discord
US intelligence agencies and the Federal Bureau of Investigation (FBI) have published new findings about the hacker access from Iran to internal communications of Republican presidential candidate Donald Trump’s campaign team that became public in August.
Ad
Offline calculator
Experts at Ben-Gurion University of the Negev have hacked offline computers – i.e. systems that are not connected to a network such as the Internet.
Increase API security
Cequence publishes explosive new data regarding the security of tour operator and hotel industry websites. Cybercriminals are increasingly using the increased traffic during the vacation season as a cover for their attacks.
Ad
Study on cyber security in companies
In today’s digitally networked world, companies are increasingly the target of cyber attacks. Attackers are primarily targeting managers, who are a particularly attractive target group due to their access to sensitive data and extensive rights within IT systems.
Wrong investment tips
Fraudsters are constantly coming up with new tricks to scam money from internet users. Now fake videos are doing the rounds in which supposed celebrities advertise investments, including SAP co-founder Dietmar Hopp.
Microsoft Office alternative
The IT security provider ESET has discovered two security vulnerabilities in the Microsoft Office alternative WPS Office for Windows. The vulnerability CVE-2024-7262 in the Office application enabled the hacker group APT-C-60 to use an exploit to execute foreign code on its victims’ devices.
Ad