Remove Encryption Remove Manufacturing Remove Security Defenses
article thumbnail

A Ransomware Group Claims to Have Breached the Foxconn Factory

Hacker Combat

The factory specializes in manufacturing, consumer electronics, medical devices, and industrial operations. Based in Tijuana, Mexico, near the California border, the facility is an electronics manufacturing giant employing 5,000 people. using the LockBit 2.0 The ransomware gang demanded over $34 million in bitcoin to be paid as ransom.

article thumbnail

5 Linux malware families SMBs should protect themselves against

Malwarebytes

There’s no shortage of reasons why an SMB might use Linux to run their business: There are plenty of distros to choose from, it’s (generally) free, and perhaps above all — it’s secure. But unfortunately, there’s more to Linux security than just leaning back in your chair and sipping piña coladas. 024BTC (~$720 USD as of June 2022).

Malware 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Industrial Control System (ICS) Cyber Security?

eSecurity Planet

Industrial control systems (ICS) are the backbone of critical infrastructure, powering essential operations in the energy, manufacturing, water treatment, and transportation sectors. These systems are integral to the smooth operation of industries such as manufacturing, power generation, oil and gas, water management, and more.

Firmware 109
article thumbnail

From Caribbean shores to your devices: analyzing Cuba ransomware

SecureList

As with most cyberextortionists lately, the Cuba gang encrypts victims’ files and demands a ransom in exchange for a decryption key. Industry affiliation does not seem to be a factor: victims have included retailers, financial and logistical services, government agencies, manufacturers, and others.

article thumbnail

Weekly Vulnerability Recap – August 14, 2023 – Old or New, Vulnerabilities Need Management

eSecurity Planet

Get the Free Cybersecurity Newsletter Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. So far, Microsoft declines to address this issue, so developers should be very cautious with VS Code extensions.

article thumbnail

Weekly Vulnerability Recap – November 6, 2023 – Windows Drivers and Exchange Flaws

eSecurity Planet

EoP exploit for AMD driver (PDFWKRNL.sys) on HVCI-enabled Windows 11 The fix: To address this issue, thorough action is required: Driver Patching: Developers and manufacturers of affected drivers must deliver patches and upgrades as soon as possible to address the reported vulnerabilities.

Software 112
article thumbnail

Vulnerability Recap 5/13/24 – F5, Citrix & Chrome

eSecurity Planet

The problem: As disclosed in the April 22nd vulnerability recap , PuTTY didn’t generate sufficiently random numbers for encryption keys. The fix: Owners of IoT with cellular connections should check for the presence of Cinterion modems and patches through the device manufacturers. May 8, 2024 Citrix Hypervisor 8.2