Generative Data Intelligence

Tag: NotPetya

Dangerous New ICS Malware Targets Orgs in Russia and Ukraine

Two dangerous malware tools targeted at industrial control systems (ICS) and operating technology (OT) environments in Europe are the latest manifestations of the cyber...

Top News

Establishing New Rules for Cyber Warfare

The efforts of the International Committee of the Red Cross (ICRC) to establish rules of engagement to combatants in a cyberwar should be applauded internationally, even...

Establishing New Rules for Cyber Warfare

The efforts of the International Committee of the Red Cross (ICRC) to establish rules of engagement to combatants in a cyberwar should be applauded internationally, even...

‘Shields Ready’ Critical Infrastructure Initiative Addresses Inevitable Cyberattacks

The US government has issued a series of prescriptions for preparing critical infrastructure operators for disasters, physical attacks, and cyberattacks, with an emphasis on...

Sandworm Cyberattackers Down Ukrainian Power Grid During Missile Strikes

Russia's infamous Sandworm advanced persistent threat (APT) group used living-off-the-land (LotL) techniques to precipitate a power outage in a Ukrainian city in October 2022,...

Sandworm Cyberattackers Down Ukrainian Power Grid During Missile Strikes

Russia's infamous Sandworm advanced persistent threat (APT) group used living-off-the-land (LotL) techniques to precipitate a power outage in a Ukrainian city in October 2022,...

Semperis and Veritas to Protect Enterprises from Cyberattacks on Active Directory Systems

HOBOKEN, N.J.–(BUSINESS WIRE)–Semperis, a pioneer in identity-driven cyber resilience, today announced a global relationship with Veritas Technologies, a leader in secure multi-cloud data management,...

Why Identity Management Is the Key to Stopping APT Cyberattacks

Dark Reading News Desk interviewed Adam Meyers, head of counter adversary operations for CrowdStrike at Black Hat USA 2023. Check out the News Desk...

Black Hat 2023: Cyberwar fire-and-forget-me-not

Critical Infrastructure, Malware What happens to cyberweapons after a cyberwar? Cameron Camp 11 Aug 2023  â€¢  , 3 min. read ...

How the war in Ukraine has been a catalyst for private-public collaborations

A number of security practitioners, policymakers, law enforcement professionals and other experts from various countries gathered in Warsaw, Poland, on May 10th, 2023, to...

UK hacker busted in Spain gets 5 years over Twitter hack and more

by Naked Security writer Some hacks become so notorious that they acquire a definite article, even if the word THE...

How the war in Ukraine has been a catalyst in private‑public collaborations

As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical...

Court Rejects Merck Insurers’ Attempt to Refuse Coverage for NotPetya Damages

An appellate court this week officially shot down an argument by insurers for Merck & Co. that they are not liable for the pharmaceutical...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?