A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
Joining the ranks of high-profile ransomware attacks at Nissan, Colonial Pipeline, JBS Foods, Schneider Electric and even Foxconn, is Dole Foods.
The global food processor was the victim of a ransomwa…
While the growth of ransomware, phishing schemes and other nefarious cyber activities are obviously not positive developments for the industrial sector, the resulting exposure and fallout from high p…
One of the on-going topics that we cover here on Security Breach is ransomware attacks.
The risk of continually discussing a topic is that it can become like white noise – always present, but in the b…
When it comes to securing the industrial enterprise, a great deal of focus is being paid to what might seem like the little things – such as passwords, logins or credentials that are used to limit ac…
The potential of smarter factories driven by advanced technologies and greater connectivity is exciting … but equally daunting.
That’s because in our enthusiasm to embrace all the time and cost saving…
We’re excited to announce that Security Breach is being sponsored by Rockwell Automation. For more information on their cybersecurity solutions, you can go to rockwellautomation.com
According to a rec…
I usually start each episode by listing off a number of escalating and intentionally frightening statistics about the rising number of cybersecurity threats facing the industrial sector. The goal is …
The numbers continue to roll in, and they’re not getting better … yet.
Ransomware attack payouts continue to grow, with the average topping out at $4.5 million in 2022. Similarly, malware attacks con…
As the world of cybersecurity continues to spawn new threats and present the industrial sector with increasingly complex prevention, detection and response needs, we’re seeing similar advancements on…
There’s a reason the term industrial-grade is used to express the highest levels of reliability and durability for products. After all, if a material, technology or tool can handle the rigors and dem…
As the saying goes, it’s the little things that kill. And in cybersecurity, that little thing can be as innocent as a singular mouse click on the wrong URL from a familiar-looking email.
A recent rep…
The MIT Technology Review Insights recently reported that midsize companies, which would mean manufacturing enterprises with annual revenues of between $200 - $700 million, were almost 500 percent mo…
Recent data from cybersecurity software and services provider Mimecast offers some depth on the rising concerns presented by phishing attacks, with 96 percent of respondents acknowledging that their …
One of the mantras that I’ve clung to from my childhood is drawn from one of my favorite toys and shows – GI Joe. Duke, Snake Eyes and the rest of the Joes always reinforced that “Knowing is half the…
On a daily basis I see a tremendous amount of data and research flow through my inbox, but a recent report from Rackspace Technology really caught my attention.
According to a recent survey performed …
GhostSec describes itself as a hacktivist group. Formed around 2015, the organization’s initial focus was shutting down ISIS websites and infiltrating their social media platforms.
Recently, the orga…
Ironically enough, one of the biggest challenges surrounding cyber defense in the industrial sector is a lack of data – data about the attacks, the attackers, their tactics and how they were able to …
Welcome to Security Breach.
Today we’re going to discus a vulnerability within the industrial sector that is essentially a product of progress.
The enhanced data sharing capabilities and operational e…
Today we’re going to discuss an evolving vulnerability in the industrial sector – the security of cloud data and networks. We’re obviously talking about the use of IT infrastructure that’s not physic…
When discussing the industrial sector’s threat landscape, we often detail events that result from vulnerabilities discovered by hackers probing for soft spots within an organization’s networks, conne…