Remove Authentication Remove Energy and Utilities Remove Firewall
article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

To ensure energy security and economic stability, protecting the infrastructure is essential. A report from 2023 revealed that 67% of energy and utility companies faced ransomware attacks, with many incidents exploiting unpatched vulnerabilities. This significantly reduces the risk of unauthorized access.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. Cisco Secure Firewall integrations. Cisco Secure Firewall has several new partner integrations. The Secure Firewall app for Splunk has been updated. Read more here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iranian Hackers Target U.S. Water Facility

SecureWorld News

The utility's general manager, Robert J. The attack has been linked to CyberAv3ngers, an Iranian-backed group known for its focus on targeting Israeli water and energy sites. Require multifactor authentication for all remote access to the OT network, including from the IT network and external networks.

article thumbnail

Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations

Security Affairs

. “As early as 2022, APT28 actors had utilized compromised EdgeRouters to facilitate covert cyber operations against governments, militaries, and organizations around the world.” The operation reversibly modified the routers’ firewall rules to block remote management access to the devices. ” reads the joint report.

article thumbnail

China-linked APT Volt Typhoon exploited a zero-day in Versa Director

Security Affairs

Exploitation requires successful authentication by a user with the necessary privileges. Although details are limited, Versa Networks confirmed one case where the vulnerability was exploited due to a customer’s failure to implement recommended firewall guidelines. ” reads the advisory published by Versa Networks. .

article thumbnail

Advisory: Malicious North Korean Cyber Activity

SecureWorld News

Here's what Blindingcan has accomplished so far: "A threat group with a nexus to North Korea targeted government contractors early this year to gather intelligence surrounding key military and energy technologies. If these services are required, use strong passwords or Active Directory authentication.

article thumbnail

Microsoft Targets Critical Outlook Zero-Day Flaw

eSecurity Planet

. “An attacker who successfully exploited this vulnerability could access a user’s Net-NTLMv2 hash which could be used as a basis of an NTLM Relay attack against another service to authenticate as the user,” the company wrote. This will prevent the sending of NTLM authentication messages to remote file shares.