As connected cars become more commonplace, the UN Regulation No. 155 sets guidelines to ensure cybersecurity in vehicles. This research assesses the risks of its highlighted attack vectors and looks beyond its scope to identify top priorities.
Linux powers many cloud infrastructures today. However, it is not immune to threats and risks. We discuss several pressing security issues including malware and vulnerabilities that compromise Linux systems in the first half of 2021.
ICS endpoint security has become more important as the interconnection between IT and OT continues to grow. Our research shares the status of global industrial systems in terms of security against both known and new threats that hound ICS endpoints.
Ransomware-stricken organizations grapple with multilevel extortion schemes that are advancing at an alarming rate. What exactly happens in these campaigns? We scrutinize three active ransomware families associated with these schemes to find out.