The Latest in IT Security

1

Election officials are cautiously declaring victory after no reports of major cyber incidents on Election Day. “After millions of Americans voted, we have no evidence any foreign adversary was capable of preventing Americans from voting or changing vote tallies,” Christopher Krebs, the director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), […]

Read more ...

1

Also known as Black Banshee, Velvet Chollima, and Thallium, the adversary is believed to have been active since at least 2012, mainly targeting think tanks in South Korea, but more recently expanding operations to the United States, Europe, and Russia. Last week, the United States published an alert containing information on the activities of the […]

Read more ...

1

Initially identified in 2017 on the systems of a Saudi Arabian oil and gas company and also referred to as Trisis and HatMan, Triton is known for the targeting of Schneider Electric’s Triconex Safety Instrumented System (SIS) controllers. Referred to by some as Xenotime, the threat actor behind the malware is believed to have been […]

Read more ...


Categories

MONDAY, NOVEMBER 30, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments