https://www.mitre.org/news-insights/impact-story/cockpit-resiliency-protecting-aircraft-data-network-attacks
Engineers in our Resilient Cyber Aerospace Testbed (RCAT) are keeping pace with advanced cyber threats by creating solutions to safeguard aircraft. MITRE’s...
network attackscockpitresiliencyprotectingaircraft
https://www.enar-eu.org/enar-members-attacks-against-racialised-people-on-the-rise/
Mar 6, 2024 - In the looming shadows of the upcoming European Union elections, a disconcerting surge in racist violence has cast a dark pall over communities across Europe....
membersattackspeopleriseeuropean
https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks.
network devicescompromisesadversarymiddleattacks
https://www.brighttalk.com/webcast/17865/661966
F5's source code leak underscored a critical reality: thousands of organizations run vulnerable edge devices that attackers are actively exploiting. Com...
edgecatastrophenetworkdeviceattacks
https://www.techtimes.com/articles/269092/20211208/chinese-ransomware-attack-major-energy-network-chinese-ransomware-shut-down-power-3-million-homes.htm
Dec 8, 2021 - Chinese ransomware attacks major energy network of CS Energy, which could potentially shut down power for about 3 million homes.
ransomware attackschinesemajorenergynetwork
https://abusix.com/blog/top-10-reasons-why-hosting-providers-should-report-attacks-back-to-the-originating-network/
Feb 3, 2026 - Hosting providers see attacks every day. Reporting abuse back to the originating network helps stop threats faster, protect reputation, and reduce global risk.
hosting providerstopreasonsreportattacks
https://techcrunch.com/2025/03/12/pentera-nabs-60m-at-a-1b-valuation-to-build-simulated-network-attacks-to-train-security-teams/?ref=jark.me
Mar 12, 2025 - Strong and smart security operations teams are at the heart of any cybersecurity strategy, and today a startup that builds tooling to help keep them on
penteranabsvaluationbuildsimulated