The Pay2Key group may have shifted its aims from extortion to destruction.
Related Articles
All CyberSecurityDive →FBI seeks public tips about Salt Typhoon
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: The FBI said it wants…
Solar power gear vulnerable to remote sabotage
Solar inverters made by three of the world’s largest manufacturers were found vulnerable to remote sabotage that could have produced large-scale power outages. Researchers from…
82% of K-12 schools recently experienced a cyber incident
Dive Brief: A startling majority — 82% — of K-12 schools experienced a cyber incident between July 2023 and December 2024, according to a report…
NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat
Hackers have disrupted critical U.S. infrastructure by targeting programmable logic controllers, the Cybersecurity and Infrastructure Security Agency warned. Source link
5 ways to protect manufacturing companies from cyberattacks
Table of Contents Strengthen IT/OT collaboration, but keep them separate Shore up identity security Update software quickly Prioritize vulnerabilities Build cyber resilience into operations The…
RansomHub using FakeUpdates scheme to attack government sector
RansomHub cyber threat actors have found a new way to deploy their ransomware, and they’re using it to target U.S. government entities. According to Trend Micro,…

