Artwork

محتوای ارائه شده توسط N2K Networks Inc. and N2K Networks. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط N2K Networks Inc. and N2K Networks یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Examining CIRCIA and VOLTZITE.

46:29
 
اشتراک گذاری
 

Manage episode 412992066 series 3357594
محتوای ارائه شده توسط N2K Networks Inc. and N2K Networks. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط N2K Networks Inc. and N2K Networks یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Chinese-manufactured devices in US networks see a 41% YoY increase. Ukraine-linked hackers deploy ICS malware against Russian infrastructure company. A look at cyberattacks that had physical consequences in 2023. Lessons from NERC’s GridEx exercise. Extension requested for comment period on CISA’s incident reporting rule. Guest Kate Ledesma, Senior Director Government Affairs at Dragos, talks about the Cybersecurity Incident Reporting for Critical Infrastructure Proposed rule (CIRCIA). The Learning Lab returns has part 2 of Mark Urban and Josh Hanrahan's discussion adversary hunting and VOLTZITE (aka Volt Typhoon).


Control Loop News Brief.

Chinese-manufactured devices in US networks see a 41% YoY increase.

“All your base are belong to us” – A probe into Chinese-connected devices in US networks (Forescout)

Ukraine-linked hackers deploy ICS malware against Russian infrastructure company.

Unpacking the Blackjack Group's Fuxnet Malware (Claroty)

A look at cyberattacks that had physical consequences in 2023.

2024 Threat Report – OT Cyberattacks with Physical Consequences (Waterfall)

Lessons from NERC’s GridEx exercise.

GridEx VII: Lessons Learned Report (NERC)

Extension requested for comment period on CISA’s incident reporting rule.

US Chamber of Commerce, industry groups call for 30-day delay in CIRCIA rules (The Record)

Control Loop Interview.

Guest Kate Ledesma, Senior Director Government Affairs at Dragos, discussing Cybersecurity Incident Reporting for Critical Infrastructure Proposed rule (CIRCIA).


Control Loop Learning Lab.

On the Learning Lab segment, listen to Dragos’ Mark Urban talking with Josh Hanrahan, Principal Adversary Hunter at Dragos, in part two of their discussion on adversary hunting and VOLTZITE (aka Volt Typhoon).

Resources:

VOLTZITE Threat Group’s Under the Radar Cyber Espionage on U.S. Critical Systems.

The 5 Critical Controls for ICS/OT Cybersecurity – SANS webinar.

Control Loop Audience Survey.

Please take a moment to fill out our super quick survey. It’s only 5 short questions. Thanks!

Control Loop OT Cybersecurity Briefing.

A companion monthly newsletter is available through free subscription and on N2K Networks website.

  continue reading

54 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 412992066 series 3357594
محتوای ارائه شده توسط N2K Networks Inc. and N2K Networks. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط N2K Networks Inc. and N2K Networks یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Chinese-manufactured devices in US networks see a 41% YoY increase. Ukraine-linked hackers deploy ICS malware against Russian infrastructure company. A look at cyberattacks that had physical consequences in 2023. Lessons from NERC’s GridEx exercise. Extension requested for comment period on CISA’s incident reporting rule. Guest Kate Ledesma, Senior Director Government Affairs at Dragos, talks about the Cybersecurity Incident Reporting for Critical Infrastructure Proposed rule (CIRCIA). The Learning Lab returns has part 2 of Mark Urban and Josh Hanrahan's discussion adversary hunting and VOLTZITE (aka Volt Typhoon).


Control Loop News Brief.

Chinese-manufactured devices in US networks see a 41% YoY increase.

“All your base are belong to us” – A probe into Chinese-connected devices in US networks (Forescout)

Ukraine-linked hackers deploy ICS malware against Russian infrastructure company.

Unpacking the Blackjack Group's Fuxnet Malware (Claroty)

A look at cyberattacks that had physical consequences in 2023.

2024 Threat Report – OT Cyberattacks with Physical Consequences (Waterfall)

Lessons from NERC’s GridEx exercise.

GridEx VII: Lessons Learned Report (NERC)

Extension requested for comment period on CISA’s incident reporting rule.

US Chamber of Commerce, industry groups call for 30-day delay in CIRCIA rules (The Record)

Control Loop Interview.

Guest Kate Ledesma, Senior Director Government Affairs at Dragos, discussing Cybersecurity Incident Reporting for Critical Infrastructure Proposed rule (CIRCIA).


Control Loop Learning Lab.

On the Learning Lab segment, listen to Dragos’ Mark Urban talking with Josh Hanrahan, Principal Adversary Hunter at Dragos, in part two of their discussion on adversary hunting and VOLTZITE (aka Volt Typhoon).

Resources:

VOLTZITE Threat Group’s Under the Radar Cyber Espionage on U.S. Critical Systems.

The 5 Critical Controls for ICS/OT Cybersecurity – SANS webinar.

Control Loop Audience Survey.

Please take a moment to fill out our super quick survey. It’s only 5 short questions. Thanks!

Control Loop OT Cybersecurity Briefing.

A companion monthly newsletter is available through free subscription and on N2K Networks website.

  continue reading

54 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع