In 2012, General Keith Alexander, who was NSA Director and commander of U.S. Cyber Command at the time, assessed the financial value of cyberespionage losses at about $338 billion a year, including intellectual property losses and downtime due to cyberattacks. He called it “the greatest transfer of wealth in history.”
Bruce Schneier recently published an article (or more accurately, at nearly 6,000 words, a manifesto) entitled Security and the Internet of Things. It’s an incredibly insightful and well-thought-out case for why government needs to get involved to regulate the security aspects of the Internet. This article summarizes some of his key points, but if you […]
CyberX has discovered critical vulnerabilities in a popular software framework used in hundreds of thousands of IIoT and industrial control system (ICS) devices.
Operation BugDrop: CyberX Discovers Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations
CyberX has discovered a new, large-scale cyber-reconnaissance operation targeting a broad range of targets in the Ukraine. Because it eavesdrops on sensitive conversations by remotely controlling PC microphones – in order to surreptitiously “bug” its targets – and uses Dropbox to store exfiltrated data, CyberX has named it “Operation BugDrop.”
Many decision-makers are still reluctant to spend more on tighter security controls to reduce ICS risk. Here are 7 examples of evolving risks in the cyber security space that you can use next time you hear “we’re not going to spend more on ICS cybersecurity because it’s never happened before.”
With all of the experts opining about the “disconnected” laptop at a Vermont utility, it’s easy to have missed this story by veteran WSJ reporter Rebecca Smith that appeared on Friday afternoon.
In short, a Lansing, Michigan utility was hacked with ransomware, resulting in a $25,000 bitcoin payment and $2.5 million worth of damage. CyberX’s VP of Industrial Cybersecurity dives into some scenarios for how cyberattackers could deploy malware on IT assets as launching points for subsequent attacks on OT networks.