Generative Data Intelligence

Tag: Cyberattack

UNDP, City of Copenhagen Targeted in Data-Extortion Cyberattack

The United Nations Development Programme (UNDP) became the victim of a cyberattack in late March, which also impacted the IT infrastructure of the city...

Cyberattack Takes Frontier Communications Offline

Texas-based Frontier Communications, which provides local residential and business telecom services in 25 states, has shut down its operations in the wake of a...

ICS Network Controllers Open to Remote Exploit, No Patches Available

A security advisory issued this week by the Cybersecurity and Infrastructure Security Agency (CISA) alerts administrators of vulnerabilities in two industrial control systems devices...

Rebalancing NIST: Why ‘Recovery’ Can’t Stand Alone

COMMENTARYAs the digital landscape grows more treacherous, companies are finally beginning to treat cybersecurity as a top operational risk. And for enterprises revising their...

Rebalancing NIST: Why ‘Recovery’ Can’t Stand Alone

COMMENTARYAs the digital landscape grows more treacherous, companies are finally beginning to treat cybersecurity as a top operational risk. And for enterprises revising their...

Dangerous New ICS Malware Targets Orgs in Russia and Ukraine

Two dangerous malware tools targeted at industrial control systems (ICS) and operating technology (OT) environments in Europe are the latest manifestations of the cyber...

Preparing for Cyber Warfare: 6 Key Lessons From Ukraine

COMMENTARYAs the conflict in Ukraine enters its third year, the global community is confronted with the grim reality of modern warfare, where cyber operations...

Sandworm Is Russia’s Top Cyberattack Unit in Ukraine

The formidable Sandworm hacker group has played a central role supporting Russian military objectives in Ukraine over the past two years even as it...

3 Steps Executives and Boards Should Take to Ensure Cyber Readiness

COMMENTARYThe new Securities and Exchange Commission (SEC) rules on cybersecurity risk management, strategy, governance, and incident disclosure recently went into effect, and organizational approaches to cybersecurity...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?