Zephyrnet Logo

Tag: network segmentation

Top News

Critical Infrastructure Security: Observations From the Front Lines

COMMENTARYRecent headlines around Volt Typhoon, a state-sponsored Chinese threat actor targeting US critical infrastructure, have caused alarm over attacker dwell time and put critical infrastructure security in...

Solar Spider Targets Saudi Arabia Banks via New Malware

The sophisticated threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to...

5 top OT threats and security challenges | TechTarget

Operational technology (OT) is a broad term for all forms of computer technology that physically interact with the industrial world. From industrial control systems...

Security concerns in IoT: Addressing the challenges head-on | IoT Now News & Reports

Among the most transformative technologies of the digital age is the Internet of Things (IoT), which is fundamentally changing how we live, work, play...

Russian APT Releases More Deadly Variant of AcidRain Wiper Malware

Researchers have uncovered a more dangerous and prolific version of the wiper malware used by Russian military intelligence to disrupt satellite broadband service in...

Chinese APT ‘Earth Krahang’ Compromises 48 Gov’t Orgs on 5 Continents

A previously unidentified Chinese espionage group has managed to breach at least 70 organizations across 23 countries, including 48 in the government space, despite...

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure What cyberthreats could wreak havoc on elections this year and how...

NSA’s Zero-Trust Guidelines Focus on Segmentation

The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...

Introducing Rapid Verification of Zone-to-Zone Segmentation with Network Perception

In today's fast-paced digital world, network security is more important than ever. With cyber threats constantly evolving and becoming more sophisticated, it is crucial...

Designing for Security for Fully Autonomous Vehicles – Semiwiki

With the advent of IoT devices, vehicles have become increasingly interconnected, offering enhanced automation, connectivity, electrification, and shared mobility. However, this progress also brings...

How Raspberry Robin Exploits 1-Day Bugs to Infiltrate Windows Networks

Title: Raspberry Robin: Exploiting 1-Day Bugs to Infiltrate Windows Networks Introduction: In the world of cybersecurity, hackers are constantly finding new ways to exploit vulnerabilities in...

Latest Intelligence

spot_img
spot_img