CoinBase Cartel
You must login to view this content
You must login to view this content
You must login to view this content
You must login to view this content
Tenable unveiled a new OT asset discovery engine that enables security teams to bring risks associated with cyber-physical systems (OT, IoT, and shadow IT) into a unified view of cyber exposure. With instant deployment and no additional IT overhead required, Tenable’s new VM-Native OT Discovery capability provides a low-friction entry point for organizations to gain comprehensive IT/OT visibility and accelerate AI-driven exposure management. According to Gartner, “Cyber and cyber-physical attacks are set to double over … More →
The post Tenable unveils OT discovery engine to expose cyber-physical risks appeared first on Help Net Security.
A sophisticated cyber campaign bearing strong operational similarities to the MuddyWater threat group has been caught sweeping more than 12,000 internet-exposed systems across multiple regions before launching focused attacks on high-value targets in the Middle East. The operation targeted critical sectors including aviation, energy, and government, with confirmed data theft from at least one Egyptian […]
The post MuddyWater-Style Hackers Scan 12,000+ Systems Before Hitting Middle East Critical Sectors appeared first on Cyber Security News.
Generative AI is moving from experimentation to everyday enterprise use, often faster than governance models were designed to support. As adoption accelerates, organizations are navigating the evolving landscape with new questions around security, data privacy, compliance, and control, all while being asked to enable innovation at speed. This 30 to 35-minute conversation offers practical perspectives on how enterprises approach AI governance. Rather than laying down a single “right” answer, panelists focus on the tradeoffs teams … More →
The post Webinar: The IT Leader’s Guide to AI Governance appeared first on Help Net Security.
Stop managing risk in silos. VM-Native OT Discovery, now available in Tenable Vulnerability Management and Tenable Security Center provides unified visibility across IT and OT domains. See every asset and manage your total cyber exposure in a unified view.
Key takeawaysFor decades, the concept of the "air gap" — a physical isolation between IT networks and critical operational technology (OT) — provided security leaders with a sense of comfort. The assumption was simple. Digital threats stay on the corporate network, while physical operations run safely in isolation.
In today's hyper-connected world, that assumption is often wrong and leaves your OT environment exposed to preventable cyber risk.
From modern data centers and smart hospitals to commercial real estate and universities, the line between the digital and the physical has blurred. IT security teams are increasingly inheriting responsibility for securing cyber-physical systems (CPS) — the HVAC controllers keeping servers cool, the badge readers securing facility entrances, and the power distribution units keeping the lights on.
Yet, for many organizations, these OT assets are a massive blind spot.
The "black box" problemWhile vulnerability management programs have matured rapidly for IT assets, covering everything from cloud workloads to laptops, operational environments are often a "black box."
This visibility gap usually stems from two distinct barriers:
The result is a dangerous paradox. Security teams are responsible for the risk of interconnected systems, but don’t have the tools to see or secure them. Attackers, however, face no such barriers, frequently pivoting from compromised IT networks to poorly defended OT assets to maximize impact.
Rethinking converged OT/IT securityTo secure the modern attack surface, organizations must stop managing IT and OT risk in silos. Security leaders need a unified view that treats a vulnerability on a programmable logic controller (PLC) with the same rigor and context as a vulnerability on a Windows server.
Achieving this requires a fundamental shift in how we approach asset discovery. Security teams need streamlined methods that provide the necessary depth of OT visibility for compliance and risk reduction, without the friction of deploying hardware across physical sites. They need a way to safely seeshadow OT assets using the infrastructure already in place.
Image: A segment of Tenable’s research and testing lab for operational technology (OT).
Introducing VM-Native OT DiscoveryOur latest release fundamentally changes the economics and accessibility of OT security tools. We are excited to announce OT Discovery, a new capability embedded directly inside the Tenable One Exposure Management Platform that provides security teams with foundational visibility into OT and IoT environments. It’s the perfect on-ramp to OT security, so you can uncover hidden OT risks and deep asset-level details.
Here is how it changes the game for your security program:
Adopting a unified approach to OT/IT exposure management builds trust.
Historically, the relationship between IT security and facility operations teams has been strained. IT wants to scan and patch known vulnerabilities. Operations teams require uptime and stability. When IT security teams try to enter the OT space with aggressive scans or unfamiliar hardware, friction is inevitable.
VM-Native OT Discovery changes the conversation. Because Tenable relies on trusted, safe query methods through familiar infrastructure, the security team can approach the ops team with reliable data and real-time exposure intelligence.
Instead of asking, "Can we install a black box on your network?" you can say, "We noticed three unmanaged PLCs communicating on the subnet. Here is exactly what they are. Let’s work together to secure them now rather than waiting 6-12 months to patch during the next maintenance interval."
Get started with OT security todayOT security is no longer just for industrial giants and organizations managing critical national infrastructure. Every manufacturer, warehouse operator, and organizations smart building management systems face operational risk.
Ready to get visibility into your OT blind spots? You don't need a massive budget or a year-long deployment project to get started. Watch this quick demo to see how you can secure your most critical assets with the vulnerability management tools you already use.
Are you an existing Tenable customer? Explore the user guide documentation for Scan Templates and Discovery Settings to get started.
Cybercriminals are always looking for smarter ways to bypass security, and their latest method is both simple and effective. Instead of building suspicious new websites, attackers now use Google Cloud Storage — a widely trusted platform — to host phishing pages that deliver dangerous malware. This lets them bypass email filters, reputation checks, and traditional […]
The post Hackers Using Google Cloud Storage to Bypass Email Filters and Deliver Remcos RAT appeared first on Cyber Security News.