The nonprofit cybersecurity organization is scanning the web for exposed services that use the Modbus industrial communications protocol on TCP port 502, but Shadowserver’s Piotr Kijewski told SecurityWeek that they plan on introducing many other ICS and operational technology (OT) protocol scans in the near future. Shadowserver has been working with national cybersecurity agencies, law…

A file containing the personal identity card numbers, employment and salary data of some 637,000 people became public this week and was widely shared through messaging apps. Prime Minister Edi Rama said the leak is being investigated. “According to a preliminary analysis, it looks more like an internal infiltration rather than an outside … cyber-attack,”…

ZeroFox provides an AI-powered platform that protects users and brands from social media-sourced threats. The platform analyzes millions of pieces of publicly-accessible content in platforms such as Microsoft 365, G Suite, LinkedIn, Facebook, Slack, Instagram, and Apple and Google mobile app stores — looking for potential threats such as account compromise, fraudulent profiles, business email…

The Delta-Montrose Electric Association (DMEA) is a member-owned and locally controlled rural electric cooperative that serves more than 34,000 customers in Colorado’s Montrose, Delta, and Gunnison counties. It is part of Touchstone Energy Cooperatives, a cooperative federation that has over 750 members across the United States. DMEA last week revealed that it had discovered a…

In this exclusive SecurityWeek virtual event, defenders from the trenches will share use cases, best practices, insights for adopting tools and processes, and war stories to help make security operations centers (SOCs) more effective and efficient. Attendees can immerse themselves in a virtual environment to discuss the latest security operations trends and challenges and gain…

The executive order on improving the nation’s cybersecurity tasked CISA with developing playbooks for federal civilian agencies to help them plan and conduct vulnerability and incident response. While the playbooks have been created for federal civilian agencies and their contractors, CISA says the information could also be useful to critical infrastructure organizations and private sector…