article thumbnail

FERC, NERC joint report on cyber incident response at electric utilities

Security Affairs

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best practices. Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) released a study on cyber incident response and recovery best practices for electric utilities.

article thumbnail

Energy insights from Davos 2025 – safeguarding the planet

OpenText Information Management

The theme explores, how can we catalyze energy, climate and nature action through innovative partnerships, increased financing and the deployment of frontier technologies. Knowledge reimagined To grow energy reliably, safely, and sustainably, knowledge will have to be reimagined.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is the recent accident at Iran Natanz nuclear plant a cyber attack?

Security Affairs

The “accident” impacted the electricity distribution network at Iran’s Natanz nuclear facility, Atomic Energy Organization of Iran spokesman Behrouz Kamalvandi told the Iranian Fars News Agency. . ” reads the post published by Jerusalem Post. ” continues the JP.

article thumbnail

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

Security Affairs

RedEnergy is a sophisticated stealer-as-a-ransomware that was employed in attacks targeting energy utilities, oil, gas, telecom, and machinery sectors. Zscaler ThreatLabz researchers discovered a new Stealer-as-a-Ransomware named RedEnergy used in attacks against energy utilities, oil, gas, telecom, and machinery sectors.

article thumbnail

MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

The Last Watchdog

Last spring, I attended NTT Research’s Upgrade 2023 conference in San Francisco and heard presentations by scientists and innovators working on what’s coming next. IOWN is all about supporting increased bandwidth, capacity and energy efficiency. Each sensor in each shroud must be uniquely smart and use next to zero energy.

article thumbnail

Ragnar Ransomware encrypts files from virtual machines to evade detection

Security Affairs

One of the victims of the ransomware is the energy giant Energias de Portugal (EDP) , where the attackers claimed to have stolen 10 TB of files. and the Ragnar Locker ransomware executable will automatically be present in the root of the C: drive. Windows XP virtual machine (Source: Sophos).

article thumbnail

Will generative AI make the digital twin promise real in the energy and utilities industry?

IBM Big Data Hub

Overcome hurdles to optimize digital twin benefits To realize the benefits of a digital twin, you need a data and logic integration layer, as well as role-based presentation. We can use this to scale the use of AI in identification of anomalies and damages on utility assets versus manually reviewing the image.