Normal view

There are new articles available, click to refresh the page.
Before yesterdaySecurity Boulevard

Social Media Warning Labels, Should You Store Passwords in Your Web Browser?

By: Tom Eston
24 June 2024 at 00:00

In this episode of the Shared Security Podcast, the team debates the Surgeon General’s recent call for social media warning labels and explores the pros and cons. Scott discusses whether passwords should be stored in web browsers, potentially sparking strong opinions. The hosts also provide an update on Microsoft’s delayed release of CoPilot Plus PCs […]

The post Social Media Warning Labels, Should You Store Passwords in Your Web Browser? appeared first on Shared Security Podcast.

The post Social Media Warning Labels, Should You Store Passwords in Your Web Browser? appeared first on Security Boulevard.

💾

The Impending Identity Crisis Of Machines: Why We Need To Secure All Non-Human Identities, From Genai To Microservices And IOT

The digital landscape is no longer solely populated by human actors. Lurking beneath the surface is a silent legion – non-human or machine identities . These non-human identities encompass computers, mobile devices, servers, workloads, service accounts, application programming interfaces (APIs), machine learning models, and the ever-expanding internet of things (IoT) devices. They are the backbone […]

The post The Impending Identity Crisis Of Machines: Why We Need To Secure All Non-Human Identities, From Genai To Microservices And IOT appeared first on Security Boulevard.

Chariot Continuous Threat Exposure Management (CTEM) Updates

17 June 2024 at 17:19

Our engineering team has been hard at work, reworking our flagship platform to enhance the Chariot platform to remain the most comprehensive and powerful CTEM platform on the market. So what’s new? Here are several new features recently added to Chariot: 1. Unmanaged Platform Chariot, Praetorian’s Continuous Threat Exposure Management (CTEM) solution, is now available […]

The post Chariot Continuous Threat Exposure Management (CTEM) Updates appeared first on Praetorian.

The post Chariot Continuous Threat Exposure Management (CTEM) Updates appeared first on Security Boulevard.

Complete Guide to OT Cybersecurity in the Aviation Industry

By: Sectrio
7 June 2024 at 04:26

Cybersecurity in the aviation industry is not just about protecting data; it’s about safeguarding lives. A single cyberattack can have catastrophic consequences, disrupting air travel, compromising safety, and causing significant economic damage.  This article aims to provide a comprehensive guide to OT cybersecurity in the aviation industry. Whether you’re a cybersecurity professional, a stakeholder in the aviation industry, or simply interested in the intersection of technology and aviation, this guide will provide valuable insights into the critical role of cybersecurity in aviation. Statistics on Recent OT/IT cyberattacks in the Aviation Industry The aviation sector has become a rising target for cyberattacks due to its reliance on vastly interconnected digital infrastructures, global supply chains, and the torrential volume of sensitive data it handles. These statistics highlight the increasing threat of OT cyberattacks in the aviation industry and underscore the importance of robust cybersecurity measures.  Understanding Operational Technology (OT) in Aviation Definition of Operational Technology (OT) in Aviation Operational technology (OT) refers to the hardware and software systems used to monitor, control, and manage physical processes and machinery in various industries, including aviation. Unlike information technology (IT), which primarily deals with data processing and communication, OT systems directly interact with the physical world. In the aviation industry, OT is essential for the safe and efficient operation of aircraft, airports, and air traffic control systems. Understanding the OT Systems Used in the Aviation Industry and Their Role OT plays a pivotal role in the aviation industry. It refers to the hardware and software used to change, monitor, or control physical devices, processes, and events in the enterprise. In the context of aviation, OT encompasses the systems and equipment that ensure the smooth operation of flights and related services. OT is deeply planted in the aviation industry, touching on every aspect from flight operations to passenger services. Its role is critical in ensuring safety, efficiency, and reliability in aviation operations.  The Current State of OT Cybersecurity in Aviation The current cybersecurity landscape in aviation is characterized by a significant rise in cyber threats targeting OT systems. These threats are not just increasing in number but also in sophistication, with high-value targets in the aviation industry handling a vast amount of valuable data, including passenger information, financial records, and proprietary technology.  This has led to an increase in motivations for threat actors, ranging from data and monetary theft to causing disruptions and harm. 1. The dynamic threat Landscape The aviation industry has seen a significant increase in cyber threats targeting OT systems. These threats range from ransomware attacks to data breaches, and their frequency and sophistication are on the rise. The interconnected nature of OT systems in aviation means that a single vulnerability can have far-reaching impacts, affecting everything from flight operations to passenger services. 2. Impact of Cyber Threats The potential impact of cyber threats on the aviation industry is substantial. A successful attack can disrupt flight operations, leading to delays or cancellations. In the worst-case scenario, a cyberattack could compromise the safety of flights. Additionally, data breaches can lead to the loss of sensitive data, damaging the reputation of airlines and resulting in significant financial losses. 3. Cybersecurity Measures In response to the growing threat landscape, the aviation industry has been taking steps to improve OT cybersecurity. These measures include implementing robust security controls, conducting regular risk assessments, and training employees on cybersecurity best practices. However, the rapidly evolving nature of cyber threats means that these measures need to be continually updated and improved. 4. Regulatory Environment The regulatory environment for OT cybersecurity in aviation is also evolving. Regulatory bodies around the world are introducing new standards and regulations aimed at improving cybersecurity in the industry. These regulations are driving changes in the industry, but they also present challenges, as airlines and other industry stakeholders need to ensure they are compliant. Recent Cybersecurity Incidents in the Aviation Industry Boeing  We have already spoken about the case earlier. This reiterates the fact that the aerospace sector has become a rising target for cyberattacks due to its reliance on vastly interconnected digital infrastructures, global supply chains, and the torrential volume of sensitive data it handles.  More recently, this attack trend has been amplified by the rapidly growing integration of Industrial Internet of Things (IIoT) technologies, rising geopolitical tensions, and the US government’s decision to designate aerospace and aviation as critical infrastructure.  As mentioned before, Boeing Chief Security Officer Richard Puckett noted that “occurrences of ransomware inside the aviation supply chain” had shot up by 600% in 2022.   This sectoral ransomware trend has persisted since Puckett flagged the threat, headlined by LockBit 3.0 ’s breach of Boeing last November and its alleged compromise of the non-profit aerospace corporation. Moreover, the European Organization for the Safety of Air Navigation (Eurocontrol) reported that ransomware was the sector’s leading attack trend in 2022, accounting for 22% of all malicious incidents. In fact, there were 52 attacks reported in 2020, 48 attacks in 2021, and 50 attacks reported by the end of August 2023, indicating a consistent occurrence of attacks on the aviation industry. Cyberattacks on London City Airport and Birmingham Airport Both of these airports experienced disruptions due to cyber intrusions. Moreover, ransomware attacks on supply chain players have seen an alarming rise, increasing by as much as 600% since the previous year. Air Albania Cyberattack A recent report highlighted a cyberattack against Air Albania. The details of the attack and its impact were not disclosed, but it underscores the vulnerability of airlines to cyber threats. Cambodia Angkor Air Cyberattack: The Host Kill Crew Hackers targeted Cambodia Angkor Air. The specifics of the attack and its consequences were not revealed, but it’s another example of airlines being targeted by cybercriminals. Gulf Air Cyberattack Gulf Air was also a victim of a cyberattack. The details of the attack and its impact were not disclosed, but it highlights the ongoing threat to airlines from cyberattacks. Qatar Airways Data Leak Qatar Airways suffered a data leak allegedly caused by the R00TK1T

The post Complete Guide to OT Cybersecurity in the Aviation Industry appeared first on Security Boulevard.

Microsoft Recall is a Privacy Disaster

6 June 2024 at 13:20
Microsoft CEO Satya Nadella, with superimposed text: “Security”

It remembers everything you do on your PC. Security experts are raging at Redmond to recall Recall.

The post Microsoft Recall is a Privacy Disaster appeared first on Security Boulevard.

IoT Security Means Remediation Not Mitigation

5 June 2024 at 22:09

A topic that I recently got asked about was vulnerability mitigation for IoT systems, which shows that even within the security community there is still a belief that mitigation equals threat resolution.  For IoT systems this simply does not work for many reasons, first among them is that these IoT, OT, or ICS systems performing […]

The post IoT Security Means Remediation Not Mitigation appeared first on Viakoo, Inc.

The post IoT Security Means Remediation Not Mitigation appeared first on Security Boulevard.

❌
❌