Naples, FL, USA
Apr 11, 2019 | By New Net Technologies
Security researchers are warning ICS managers that a Russian hacking group linked to an attempt to blow up a Saudi oil plant has been found inside a second critical infrastructure (CNI) facility. The sophisticated Triton hacking group has been active since 2014 and uses several different custom and commodity tools in order to gain access to and maintain their presence inside IT and OT networks of CNI firms. Triton was first identified in a Saudi Arabian oil plan in 2017.
Apr 5, 2019 | By New Net Technologies
Security researchers at Bormium recently discovered over a dozen US-based servers being used to host and distribute 10 different strains on malware through large scale phishing campaigns.
Feb 5, 2019 | By New Net Technologies
Huddle House, an Atlanta-based restaurant chain with over 300 locations across the United States, has become the latest restaurant chain to suffer a Point-of-Sale (POS) data breach.
Feb 4, 2019 | By New Net Technologies
A US energy company, identified by some media sources as Duke Energy, recently received a $10 million fine from the North American Electric Reliability Corp. for repeated violations of critical infrastructure protection (CIP) reliability standards.
Jan 31, 2019 | By New Net Technologies
Airbus has revealed they recently experienced a cyber-attack that resulted in compromised employee information. In a recently published statement, Airbus claimed they detected a cyber intrusion on Airbus “Commercial Aircraft business” information systems, resulting in unauthorized access to data. The aerospace giant recognized the need to comply with the GDPR (General Data Protection Regulation) and disclosed the breach to regulators within 72-hours of discovering the incident.
Jan 21, 2019 | By New Net Technologies
Given the latest WannaCry Ransomware epidemic, which infected more than 230,000 users in over 150 countries, it’s vitally important that organizations fully understand the risks associated with using out-of-date systems and software.
Jan 1, 2019 | By New Net Technologies
Without our help, controlling changes can be one of the biggest challenges facing multi-functional IT Teams. The size of task, process, and coordination of effort often means that changes continue to occur outside of any planned change approvals and the IT team is unable to prevent this from continuing. The solution? NNT’s Managed Change Control Program.
Dec 1, 2018 | By New Net Technologies
In early 2017, NNT assembled a panel of experts to discuss the increased importance of applying the Center for Internet Security Controls as part of a modern approach to cyber security. The session also highlighted the benefits of combining the CIS Controls with ongoing, real-time compliance monitoring.
Nov 1, 2018 | By New Net Technologies
Some of us will need therapy during and after an audit - that’s not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
Oct 1, 2018 | By New Net Technologies
Right now, Ransomware is the Great White Shark of cyber-attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily “with a bigger Boat”?
Feb 27, 2019 | By New Net Technologies
SecureOps combines established best practices for security and IT service management to deliver a holistic and comprehensive solution that identifies and highlights unknown, unwanted and potentially malicious events in real-time…without all the NOISE and headaches of endless alerts.
Feb 27, 2019 | By New Net Technologies
File Integrity Monitoring (FIM) is a foundational control that involves analyzing operating system and application software files to determine if and when they have changed, how they changed and who made the change using a verification method between a current file state and a known baseline.