TURLA LIGHTNEURON One email away from remote code execution

May 7, 2019

Turla, also known as Snake, is one of oldest, still-active cyberespionage groups, with more than a decade of experience. Its operators mainly focus on high-profile targets such as governments and diplomatic entities in Europe, Central Asia and the Middle East. They are known for having breached major organizations such as the US Department of Defense in 2008 and the Swiss defense company RUAG in 2014. More recently, several European countries including France and the Czech Republic went public to denounce Turla’s attacks against their governments.

Spotlight

Sentinel Technologies

When it comes to achieving a tangible ROI and sustainable performance from your IT environment, Sentinel takes the lead. Even as our services have spanned generations of technology, Sentinel has stayed at the forefront of IT developments and maintained a singular focus on providing practical and innovative solutions. With single-source accountability, Sentinel processes and teams can efficiently address a range of IT needs – from communications, to data center, to cloud and managed services.

OTHER WHITEPAPERS
news image

FortiClient Data Sheet

whitePaper | July 12, 2023

FortiClient’s Fortinet Security Fabric integration provides endpoint visibility through telemetry and ensures that all Security Fabric components – FortiGate, FortiAnalyzer, EMS, managed APs, managed Switches, and FortiSandbox – have a unified view of endpoints in order to provide tracking and awareness, compliance enforcement, and reporting. Traditional virtual private network (VPN) tunnels or new, automatic ZTNA tunnels provide secure remote connectivity. Provide security and protection for endpoints when local or remote.

Read More
news image

Cloud Collaboration Security Technical Paper Series: Webex Messaging

whitePaper | December 17, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. This paper describes the architecture and security features related to the Webex Messaging service and the suite of tools that the Webex Messaging service provides to keep customers’ data safe from Cisco as well as external attackers.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

Cybersecurity - for safe and secure mobility

whitePaper | June 6, 2022

In a world that is increasingly connected and digital, cybersecurity is no longer simply an operational requirement – it is an economic necessity that is vital to the ongoing health of any business.

Read More
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More

Spotlight

Sentinel Technologies

When it comes to achieving a tangible ROI and sustainable performance from your IT environment, Sentinel takes the lead. Even as our services have spanned generations of technology, Sentinel has stayed at the forefront of IT developments and maintained a singular focus on providing practical and innovative solutions. With single-source accountability, Sentinel processes and teams can efficiently address a range of IT needs – from communications, to data center, to cloud and managed services.

Events