Tag Archive for: Check

Tangedco forms cyber security team to check grid hacking in Tamil Nadu | Chennai News


CHENNAI: To ensure the safety of the electricity grid from cyber attacks, Tamil Nadu Electricity Generation and Distribution Corporation (Tangedco) has formed a dedicated team for cyber security for Tamil Nadu Transmission Corporation (Tantranso) and State Load Dispatch Centre (SLDC).
An information security division (ISD) and a security operation centre (SOC) have been formed by redeploying the existing officials in line with the guidelines issued by the Central Electricity Authority (CEA) in 2021 for compliance by power utilities across the country.
There were reports of Chinese hackers targeting Indian power hubs last year. Tata Power confirmed it was hit by a cyberattack in October 2022.
The Union government has already set up a computer emergency response team under the power ministry to act as a nodal agency to coordinate all matters related to cyber security.
Framing of information security policy, implementing a security management system, and cyber crisis management plan, acquiring ISO 27001, conducting cyber security audits once in six months and mock drills are some of the cyber security measures Tangedco should incorporate to comply with CEA guidelines.
Currently, one assistant executive engineer and eight assistant engineers have been shifted to take care of the activities of ISD and SOC at the state load despatch centre, while two executive engineers and an assistant executive engineer will take care of the cyber security activities on behalf of CERT-GO and CERT-TRANS.
The chief engineer (personnel) at Tangedco has been directed to identify officers and redeploy them in the newly created posts. A senior official of the discom said that dedicated teams for cyber security have been formed to secure the power networks from the cyber-attacks leading to blackouts in future.

Source…

Remcos Trojan back on Check Point’s top 10 list of global threats


Check Point Software Technologies’ Global Threat Index for February has seen Remcos Trojan return to the top 10 list for the first time since December 2022, after it was reported being used by threat actors to target Ukrainian government entities through phishing attacks.

According to the report, conducted by Check Point Research (CPR), Emotet Trojan and Formbook Infostealer placed second and third respectively, while education/research remained the most targeted industry, followed by government/military and healthcare.

Despite researchers identifying a 44 per cent decrease in the average number of weekly attacks per organization between October 2022 and last month, Ukraine remains a popular target for cybercriminals following the Russian invasion.

“In the most recent campaign, attackers impersonated Ukrtelecom JSC in a mass email distribution, using a malicious RAR attachment to spread the Remcos Trojan,” authors of the report note.

“Once installed, the tool opens a backdoor on the compromised system, allowing full access to the remote user for activities such as data exfiltration and command execution. The ongoing attacks are believed to be linked to cyberespionage operations due to the behavior patterns and offensive capabilities of the incidents.”

Researchers also revealed that “while there has been a decrease in the number of politically motivated attacks on Ukraine, they remain a battleground for cybercriminals. Hacktivism has typically been high on the agenda for threat actors since the Russo-Ukrainian war began and most have favored disruptive attack methods such as DDoS to garner the most publicity.

“However, the latest campaign used a more traditional route of attack, using phishing scams to obtain user information and extract data. It’s important that all organizations and government bodies follow safe security practices when receiving and opening emails.”

This includes not downloading attachments without scanning them first, avoiding clicking on links within the body of the email, and checking the sender address for any abnormalities such as additional characters or misspellings, the report stated.

Qbot was the most prevalent malware last month,…

Source…

United Kingdom Cyber Security Market Report 2023-2027 Featuring Broadcom, IBM, Palo Alto Networks, Mcafee, Cisco, Dell, Fortinet, BAE Systems, Check Point Software Technologies, & Trend Micro


DUBLIN, Feb. 10, 2023 /PRNewswire/ — The “United Kingdom Cyber Security Market By Security Type (Network Security, Endpoint Security, Cloud Security, Application Security, Content Security and Others), By Solution Type, By Deployment Mode, By End-User Industry, By Region, Competition Forecast & Opportunities, 2027” report has been added to  ResearchAndMarkets.com’s offering.

Research and Markets Logo

Research and Markets Logo

The United Kingdom cyber security market is anticipated to witness a growth of steady CAGR in the forecast period, 2023-2027

Rapid digital transformation of all prominent industry verticals and the flourishing e-commerce industry are accelerating cybercrime and fraudulent activities.

The rise in spending on cyber security from private and public institutions and the increase in the number of cyber-attacks and malware activities are the key factors driving the growth of the United Kingdom cybersecurity market in the forecast period. With the need to protect confidential data from unauthorized access, organizations are actively adopting cybersecurity solutions.

Increased Complexity of Cyber-attacks Drives the Market Demand

Due to the adoption of online platforms by various end-user industries, a large amount of data is generated every day, which needs to protect from unauthorized access.

The rapid development of digitized services and the growing proliferation of online shopping among consumers are accelerating the rate of cybercrime activities, leading to increased spending on security by the public and private sectors. Hackers use innovative ideas to lure users, thereby increasing the complexity and intensity of cyber-attacks.

Increased sophistication and complexity of cybercrime activities drive the demand for advanced security solutions among enterprises. Companies have started to consider cybercrime as a major problem that could result in massive financial loss.

The rise in the market players offering innovative solutions to organizations and the growing threat of cyber-attacks are expected to fuel the growth of the United Kingdom cybersecurity market in the forecast period.

Supportive Government Policies Boost the Market Demand

Integrating advanced technologies such as machine learning,…

Source…

How Check Point is keeping pace with the cyber security landscape


Having invented the modern firewall that enterprises still use today to keep threat actors at bay, Check Point Software’s founder and CEO Gil Shwed cuts an influential figure in the cyber security industry.

He wrote the first version of FireWall-1, the company’s flagship offering that became the world’s first commercially available firewall product in 1994, and patented stateful inspection, now a de facto standard security technology.

Under his leadership, Check Point has broadened its portfolio, offering a wide range of security capabilities from cloud and network security to a unified security management tool called Infinity that consolidates security capabilities into a single platform.

In a wide-ranging interview with Computer Weekly, Shwed spoke about how Check Point is keeping pace with the cyber security landscape, the company’s key growth areas and approach to cloud security, as well as how generative AI (artificial intelligence) will impact cyber security.

Could you give me a sense of the growth areas for the company, particularly in the Asia-Pacific region?

Shwed: I think the growth areas are almost unlimited because our business is multi-dimensional, especially in Asia, where not all the countries are in the same stage of development. So clearly, there is more potential everywhere.

For those in less developed countries, there’s plenty of potential to catch up and get to a reasonable level of security and those in developed countries will keep investing because they know how important it is.

In terms of technology, I think the real challenge today is from a product perspective. While we can sell more products to secure the cloud, networks and users, it’s important to create a collaborative platform for security architectures to work together.

Now, if you look at traditional defence, when a fire alarm goes off, we’re not going to sit around and say we don’t care. The doors will close, and we will all take care of it to make sure the fire doesn’t spread to the entire building.

The average cloud application has about 15 connections to other applications, and not all of them are owned by your company, so the risk level on the cloud is very high

Source…