Eaton’s IPM solution is designed to ensure system uptime and data integrity by allowing organizations to remotely monitor, manage and control the uninterruptible power supply (UPS) devices on their network. According to security advisories published this month by Eaton and the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the IPM product is affected by six…

Several cybersecurity-related acquisitions and mergers were announced in the week of April 19-25, 2021. Altron acquires Lawtrust South Africa-based technology solutions provider Altron has acquired Lawtrust, which provides digital trust and cybersecurity solutions, for ZAR 245 million (USD 17 million). Lawtrust, which is also based in South Africa, will help Altron expand its security offerings….

Attacks against the supply chain have been growing in quantity and gravity for several years, culminating in SolarWinds. Most discussion has focused on the software supply chain, but a new study shows that the physical logistics supply chain is equally subject, and susceptible, to cyberattacks. The Covid-19 pandemic has increased and highlighted the world’s reliance…

The funding round was led by investment group Caisse de dépôt et placement du Québec (CDPQ), with participation from Neuberger Berman, Viking Global Investors and Atreides Management. The money will be used to continue the company’s expansion. Druva has developed a cloud-nacybersecuritytive platform that helps organizations protect data across cloud environments, endpoint devices, SaaS applications…

Wyatt Travnichek, 22, was charged last month with remotely accessing the Post Rock Rural Water District’s systems in March 2019, about two months after he quit his job with the utility. He’s accused of shutting down the facility’s cleaning and disinfecting procedures. When he worked for the utility, he would monitor the water plant remotely…

PCAP, or full packet data capture for analysis, does what it says – it captures the entirety of every packet that comprises the network traffic (both metadata and content). If something happens on the network, PCAP knows about it. Whether it is malware moving data around, or staff arranging a private party, it can be…

A cybersecurity attack targeted a vulnerability in Accellion, a third-party vendor that is used to securely transfer files, the university said in a statement Wednesday. “We understand those behind this attack have published online screenshots of personal information, and we will notify members of the UC community if we believe their data was leaked in…

The National Counterintelligence and Security Center warned Thursday that foreign hackers are increasingly targeting vendors and suppliers that work with the government to compromise their products in an effort to steal intellectual property and carry out espionage. The NCSC said it is working with other agencies, including the Cybersecurity and Infrastructure Security Agency, to raise…