Emotet Trojan is back as the world unlocks

Credit to Author: Prashant Tilekar| Date: Sat, 26 Sep 2020 05:46:53 +0000

A threat actor named Emotet Trojan has been in the wild for more than 5 years, and now it is back after a 5 months break. It has spread globally, infecting new as well as old targets. It is re-launched with multiple Malspam Campaigns to distribute in all sectors. We…

Read more

The Biggest Cyberattacks of 2020…so far

Credit to Author: Quickheal| Date: Wed, 16 Sep 2020 08:09:59 +0000

It’s been a crazy 2020 so far. The COVID-19 pandemic has ravaged the entire world, changing the nature of how human beings live and interact with each other. There have been other natural disasters that have caused tremendous loss of life and devastation. But that didn’t mean cybercriminals remained quiet….

Read more

Redistribute Energy Savings in Smart Buildings to Fund Cybersecurity Investments

Credit to Author: Tim Geiger| Date: Tue, 14 Jul 2020 13:00:01 +0000

By Tim Geiger, President, Stark Tech Group. The Stark Tech Group is a Master-level BMS EcoXpert™. Today, many owners of buildings and smart buildings now recognize that implementing a robust… Read more »

The post Redistribute Energy Savings in Smart Buildings to Fund Cybersecurity Investments appeared first on Schneider Electric Blog.

Read more

Three Ways to Reduce Insider Cyberattacks on Industrial Control Systems

Credit to Author: Michael Pyle| Date: Wed, 06 May 2020 12:00:32 +0000

When power grids, water networks and gas utility systems are targeted by cyberattacks, systems that are essential to our everyday lives are affected. While the damage potential due to external… Read more »

The post Three Ways to Reduce Insider Cyberattacks on Industrial Control Systems appeared first on Schneider Electric Blog.

Read more

Consumerization: a better way to answer cybersecurity challenges

Credit to Author: Akshay Bhargava| Date: Wed, 25 Mar 2020 16:00:00 +0000

Malwarebytes CPO Akshay Bhargava explains why the consumerization of IT security—consumer-grade ease of use, plus enterprise security expertise—can meet the cybersecurity challenges of today.

Categories:

Tags:

(Read more…)

The post Consumerization: a better way to answer cybersecurity challenges appeared first on Malwarebytes Labs.

Read more

Dispelling the Myths Surrounding Operations Technology (OT) Network Cybersecurity

Credit to Author: Michael Pyle| Date: Thu, 20 Feb 2020 13:00:41 +0000

According to Microsoft, the annual damage caused by cybercrime is expected to reach $6 trillion by 2021, up from $3 trillion in 2015. This number includes significant increases in attacks… Read more »

The post Dispelling the Myths Surrounding Operations Technology (OT) Network Cybersecurity appeared first on Schneider Electric Blog.

Read more