Page 2
-
CMMC is coming, but most contractors still have a long road to full compliance
A new survey illustrates the defense industrial base’s fragmented security posture.
-
Canadian airline WestJet says some customer data stolen in June cyberattack
The attack occurred during the same period when Scattered Spider had begun to pivot toward the aviation sector.
-
Cisco firewall flaws endanger nearly 50,000 devices worldwide
The U.S., the U.K. and Japan lead the list of the most vulnerable countries.
-
CISA to furlough 65% of staff if government shuts down this week
Employees are worried about threatened mass firings and the cybersecurity ripple effects of a funding lapse.
-
CISA orders feds to patch Cisco flaws used in multiple agency hacks
One U.S. official called the ongoing cyberattack campaign “very sophisticated.”
-
Jaguar Land Rover to resume some manufacturing within days
The U.K. will support a $2 billion loan guarantee to help restore the automaker’s supply chain after a cyberattack disrupted production.
-
Jaguar Land Rover begins phased restoration of services following cyberattack
The luxury automaker is working diligently to clear payment backlogs and resume the shipment of parts.
-
RTX confirms hack of passenger boarding software involved ransomware
The parent company of Collins Aerospace said the attack is not expected to have a material impact on financial results, according to an SEC filing.
-
Critical infrastructure operators add more insecure industrial equipment online
The problem isn’t limited to legacy technology. New devices are exposed with critical vulnerabilities.
-
Cyber insurance could greatly reduce losses from diversification, mitigation measures
A report by CyberCube shows the global market is heavily concentrated in the U.S. and would benefit from expanding into new segments and improving cyber hygiene.
-
China-linked groups are using stealthy malware to hack software suppliers
Google, which disclosed the campaign, said it was one of the most significant supply-chain hacks in recent memory.
-
CISA urges dependency checks following Shai-Hulud compromise
Security teams are urged to review their software environments after a major supply chain attack on the NPM ecosystem.
-
UK authorities arrest man in connection with cyberattack against aviation vendor
The attack against Collins Aerospace led to significant flight disruptions at Heathrow and other major European hubs.
-
Jaguar Land Rover to extend production pause into October following cyberattack
Meanwhile, Stellantis said hackers gained access to some customer information in a third-party data breach.
-
Many ‘material’ cybersecurity breaches go unreported: VikingCloud
The research also found that cyberattacks have escalated both in frequency and severity in the past year, with AI serving as a primary driver behind the surge.
-
SonicWall customers warned about brute force attacks against cloud backup service
Hackers have gained access to key information that could help exploit firewalls.
-
Flights across Europe delayed after cyberattack targets third-party vendor
A suspected ransomware attack targeting a U.S. company that provides check-in technology has led to widespread flight disruptions since Friday.
-
Social engineering campaigns highlight the ability to exploit human behavior
A report by S&P says organizations should consider changes to strengthen cyber governance, training and awareness.
-
AI-powered vulnerability detection will make things worse, not better, former US cyber official warns
Patching won’t be able to keep up with discovery, said Rob Joyce, who once led the National Security Agency's elite hacking team.
-
Evolving AI attacks, rapid model adoption worry cyber defenders
IT defenders think many of their security tools aren’t ready for AI-powered cyberattacks, according to a new report.
-
Preemptive security predicted to constitute about half of IT security spending by 2030
The increasing use of AI will drive a demand for technology that can anticipate and neutralize threats, Gartner said in a new report.
-
Retrieved from R. Eskalis/NIST.
NIST explains how post-quantum cryptography push overlaps with existing security guidance
The agency published a document linking its recommendations for PQC migration to the advice in its landmark security publications.
-
UK arrests 2 more alleged Scattered Spider hackers over London transit system breach
Authorities say one of the suspects also hacked several U.S. healthcare firms.
-
Healthcare firms’ hack-related losses outpace those of other sectors
Companies in the healthcare sector experienced far more attacks costing more than $500,000 compared with organizations in other industries, according to a new report.
-
Bridgestone Americas restores facilities’ network connections following cyberattack
The tire maker said it has begun to ramp up production but is still closely monitoring its processes for any issues.