cybersecurity

ZipLine phishing campaign uses social engineering to target manufacturing, critical supply chains

window.location.replace("https://industrialcyber.co/manufacturing/zipline-phishing-campaign-uses-social-engineering-to-target-manufacturing-critical-supply-chains/");

Chinese APTs running persistent campaign target critical infrastructure, telecom networks

window.location.replace("https://industrialcyber.co/news/chinese-apts-running-persistent-campaign-target-critical-infrastructure-telecom-networks/");

New CISA ICS advisories on INVT, Schneider Electric, and Danfoss equipment highlight code execution, DoS risks

window.location.replace("https://industrialcyber.co/industrial-cyber-attacks/new-cisa-ics-advisories-on-invt-schneider-electric-and-danfoss-equipment-highlighting-code-execution-dos-risks/");

EU, ENISA launch €36 million Cybersecurity Reserve to tackle cyber incidents under Cyber Solidarity Act

window.location.replace("https://industrialcyber.co/nis2/eu-enisa-launch-e36-million-cybersecurity-reserve-to-tackle-cyber-incidents-under-cyber-solidarity-act/");

CISA launches free web tool to translate software acquisition guidance into actionable procurement steps

window.location.replace("https://industrialcyber.co/cisa/cisa-launches-free-web-tool-to-translate-software-acquisition-guidance-into-actionable-procurement-steps/");

Popular

Subscribe

spot_imgspot_img