There are various cyber attack vectors for the maritime industry which could result in taking full control over a vessel or fleet or creating damage to critical systems on board.
NATO officials warned that state-sponsored cyber attacks on member countries could invoke Article 5 that calls for a coordinated military response against aggressors.
When one thinks of cyber attacks on industrial networks, one often pictures advanced nation-state threat actors using sophisticated techniques. A new report indicates that the modern trend may be in the other direction.
Here’s what needs to be done at the enterprise level to ensure bulletproof cybersecurity against state-sponsored cyber attacks in the most uncertain times of COVID-19 and beyond.
The breach of the Microsoft Exchange email server software is estimated to have hit tens of thousands of victims. The Biden administration has formally declared that Chinese state-backed APT groups were behind the original cyber attacks.
How do we prevent AI from being used as a tool for cyberattacks? We need to come up with ways to keep AI under control and stop hackers from manipulating automated computer systems and cause them to take actions they were never intended to take.
Australian companies that have connections to the country's critical infrastructure might have no choice but to allow the government to step in during cyber attacks, if new legislation proposed by the Morrison government is approved.
Lloyd’s of London has issued a bulletin indicating that its cyber insurance products will no longer cover the fallout of cyber attacks exchanged between nation-states. This definition extends to operations that have "major detrimental impact on the functioning of a state."
Be vigilant when you engage with third party service providers. Ultimately it is your responsibility under the GDPR when cyber attacks and data breaches occur, not solely your service providers.
Ukraine's major internet provider Triolan suffered two severe cyber attacks disrupting internet services in what it described as the "vile strategy of the enemy."