Ransomware can impact industrial operations in the bid to cause disruptions. Organizations need to reevaluate the security of their IoT environments in the face of such a threat.
In der ersten Hälfte dieses Jahres waren die Festungen der Cybersicherheit belagert von Cyberkriminellen, die darauf warteten, beim kleinsten Riss in der Verteidigung zuzuschlagen, um wertvolle Güter zu stehlen.
As connected cars become more commonplace, the UN Regulation No. 155 sets guidelines to ensure cybersecurity in vehicles. This research assesses the risks of its highlighted attack vectors and looks beyond its scope to identify top priorities.
As connected cars become more commonplace, the UN Regulation No. 155 sets guidelines to ensure cybersecurity in vehicles. This research assesses the risks of its highlighted attack vectors and looks beyond its scope to identify top priorities.
Our research provides a detailed analysis of the new tools and techniques used by Earth Baku in its cyberespionage campaign against organizations in the Indo-Pacific region.
Linux powers many cloud infrastructures today. However, it is not immune to threats and risks. We discuss several pressing security issues including malware and vulnerabilities that compromise Linux systems in the first half of 2021.
Using an island resort analogy, we detail sample scenarios and potential risks of telecommunications IT for organizations and telecommunications companies, along with our recommendations.