article thumbnail

The Dangerous Weak Link in the US Food Chain

WIRED Threat Level

Without an information sharing and analysis center, the country’s food and agriculture sector is uniquely vulnerable to hackers.

article thumbnail

Pro-Russia hackers target critical infrastructure in North America and Europe

Security Affairs

Pro-Russia hacktivists have been targeting and compromising small-scale Operational Technology (OT) systems in North American and European Water and Wastewater Systems (WWS), Dams, Energy, and Food and Agriculture Sectors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

JBS attack has likely a Russian origin

Security Affairs

“The White House has offered assistance to JBS and our team at the Department of Agriculture have spoken to their leadership several times in the last day,” Jean-Pierre said. Department of Agriculture. Analysis observed that U.S. The risk is that the U.S.

article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

In March, the threat actors hit a South American agricultural organization. ” reads the analysis published by Talos. Talos believes that NineRAT was built around May 2022, but was first spotted on March 2023 as part of Operation Blacksmith.

article thumbnail

HawkEye Keylogger is involved in attacks against business users

Security Affairs

” reads the analysis published by Cisco Talos. “ In April 2019, threat actors launched numerous campaigns aimed at targeting industries such as transportation and logistics, healthcare, import and export, marketing, agriculture, and others. . . ” continues the post.

article thumbnail

San Francisco 49ers NFL team discloses BlackByte ransomware attack

Security Affairs

The analysis of the ransomware revealed that it was developed to avoid infecting systems that primarily use Russian or related languages. The experts spotted the BlackByte ransomware while investigating a recent malware incident. ” reads the advisory. ” Follow me on Twitter: @securityaffairs and Facebook.

article thumbnail

Hunting the ICEFOG APT group after years of silence

Security Affairs

This week, Chi-en (Ashley) Shen presented at the CONFidence cybersecurity conference held in Poland her analysis on new samples of malware associated with the ICEFOG group. Below the conclusions of the excellent analysis conducted by Shen: ICEFOG is malware shared among Roaming Tiger, APT15, Temp Group A and suspected APT9.