Remove Authentication Remove Encryption Remove Energy and Utilities
article thumbnail

Enhancing Energy Management: Tackling the Security Challenges of Smart Metering

SecureWorld News

Smart meters are transforming the way we manage energy consumption. Central to the Smart Grid (SG) initiative, these devices facilitate two-way communication between utilities and household appliances, enabling real-time monitoring and control. Many smart meters do not encrypt their data, making it vulnerable to interception.

article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. Energy services companies are a lucrative target for adversaries. Wed, 01/13/2021 - 09:42. Cybersecurity challenges.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

To ensure energy security and economic stability, protecting the infrastructure is essential. A report from 2023 revealed that 67% of energy and utility companies faced ransomware attacks, with many incidents exploiting unpatched vulnerabilities. This significantly reduces the risk of unauthorized access.

article thumbnail

MY TAKE: The role of semiconductors in bringing the ‘Internet of Everything’ into full fruition

The Last Watchdog

Power modules must continue to advance; energy consumption of big digital systems must continue to become more and more efficient to support the smart commercial buildings and transportation systems of the near future, Rosteck says. Energy at the edges. How microcontrollers distribute energy is a very big deal.

Internet 189
article thumbnail

SHARED INTEL: Poll shows companies pursuing ‘Digital Trust’ reap benefits as laggards fall behind

The Last Watchdog

DigiCert’s clients and prospects are steadily modernizing the way digital connections get authenticated and sensitive assets get encrypted, Trzupek told me. “In Policies and enforcement: Next, establish organizational policies that outline appropriate and inappropriate behaviors regarding digital assets.

article thumbnail

IT threat evolution Q3 2024

SecureList

The malware utilizes cloud resources for its C2 (command and control) servers, which it accesses via APIs using authentication tokens. The threat actor specializes in encrypting and then deleting its targets’ data, which suggests that the group’s primary objective is to cause as much damage as possible.

article thumbnail

Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia

SecureList

The group under review has a toolkit that includes utilities such as Mimikatz, XenAllPasswordPro, PingCastle, Localtonet, resocks, AnyDesk, PsExec, and others. To maintain access to the system, the attackers used the NSSM and Localtonet utilities. First, they obtained the NTDS.dit dump with the Ntdsutil utility. and Babuk.