Saturday, June 10, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • BSidesSF 2023 - Eric Chiang, Brandon Weeks - Scalable Security: How To Win Friends And Not Burn Out Everyone
  • Holistic API Security Strategy for 2023
  • Digital Trust & Safety Roundup: New product features, insights from Sift’s CMO, and lessons from digital native companies
  • Risk Registers: The Ultimate Guide with Examples & Template
  • Coverage Advisory for CVE-2023-34362 MOVEit Vulnerability
Data Security SBN News Security Bloggers Network Threats & Breaches 

Home » Cybersecurity » Data Security » Saipem Identified a Digital Attack against Some of Its Servers

SBN

Saipem Identified a Digital Attack against Some of Its Servers

by David Bisson on December 12, 2018

Italian oil and gas industry contractor Saipem has announced that it identified a digital attack against some of its servers.

Cloud Native Now

On 10 December, Saipem published a statement on its website in which it revealed the attack and said it was in the process of collecting information to determine the impact on its systems and the actions it should take to restore normal operations.

This notice didn’t provide specific details about the digital attack. But Mauro Piasere, Saipem’s head of digital and innovation, did provide a bit of this information. He said that the company’s ongoing investigation had determined that the attack had originated in Chennai, India. Piasere went on to say that the attack had mainly affected the company’s servers in Saudi Arabia, the United Arab Emirates and Kuwait and had partially targeted its infrastructure in Aberdeen in Scotland.

“The servers involved have been shut down for the time being to assess the scale of the attack,” Mauro told Reuters. “There has been no loss of data because all our systems have back-ups,” he continued, adding that the back-up systems would activate once the threat had been eliminated.

At the conclusion of its statement, the Italian oil and gas industry contractor said that it’s in the process of notifying authorities about the incident.

The digital attack against Saipem highlights the ongoing threats targeting the energy industry. In the Middle East, for example, three-quarters of oil and gas companies suffered at least one security compromise between 2017 and 2018 that resulted in the loss of confidential information or disrupted the OT environment. Reflecting these experiences, 70 percent of IT and operational technology (OT) security professionals at energy and oil and gas companies told Tripwire they’re concerned that a successful digital attack could cause an explosion or other catastrophic failure.

In response, energy (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/saipem-identified-a-digital-attack-against-some-of-its-servers/

December 12, 2018December 12, 2018 David Bisson digital attack, IT Security and Data Protection, Latest Security News, Saipem, Server
  • ← What is Web Cache Poisoning?
  • Entrust Datacard Launches new Managed Services for PKI →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Sat 10

Simplify, Secure, Strengthen: Implementing Zero-Trust Across Your Endpoints

May 17 @ 1:00 pm - July 12 @ 2:00 pm
Tue 13

Uncovering the Hidden Cybersecurity Threat in Your Organization

June 13 @ 1:00 pm - 2:00 pm
Wed 14

Enrich Security Investigations With ServiceNow Asset Data in Snowflake

June 14 @ 3:00 pm - July 24 @ 4:00 pm
Thu 15

Securing Containers & Kubernetes With AWS And Calico

June 15 @ 3:00 pm - 4:30 pm
Thu 22

Strange Bedfellows: Software, Security and the Law

June 22 @ 11:00 am - 12:00 pm
Thu 22

Sneak Peek: Cloud Security Prioritized With Sonrai

June 22 @ 1:00 pm - 2:00 pm
Thu 22

Unleash the Potential of Your Log and Event Data, Including AI’s Growing Impact

June 22 @ 3:00 pm - 4:00 pm
Jul 24

Identity and Access Management

July 24 @ 1:00 pm - 2:00 pm
Feb 12

Ransomware

February 12, 2024 @ 1:00 pm - 2:00 pm
Mar 11

Securing Open Source

March 11, 2024 @ 1:00 pm - 2:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

The FBI Could Help Retrieve Your Data After a Ransomware Attack
Netflix: Is Password-Sharing a Crime?
Pics AND it Didn’t Happen: Sex Deepfake FBI Alert
OSINT For and Against Fraudsters: Two Sides of the Same Coin
Lacework Adds Ability to Manage and Secure Cloud Identities
“Caffeine” Phishing Service Domains, Patterns Still Heavily Used After Store Seemingly Defunct
CVE-2023-34362 – MOVEit Transfer – An attack chain that retrieves sensitive information
Google Addresses Latest Zero-Day Affecting Chrome
Cyber Attack Due to Malicious Open-source Package
New Research Shows Bot Attacks Are Surging

Download Free eBook

7 Must-Read eBooks for Security Professionals

Industry Spotlight

Dark Web Threats Target Energy Industry as Cybercrime Tactics Shift
Analytics & Intelligence Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Malware Security Boulevard (Original) Threat Intelligence 

Dark Web Threats Target Energy Industry as Cybercrime Tactics Shift

June 2, 2023 Nathan Eddy | Jun 02 0
‘Predator’ — Nasty Android Spyware Revealed
Analytics & Intelligence API Security Cyberlaw Cybersecurity Data Security Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Predator’ — Nasty Android Spyware Revealed

May 30, 2023 Richi Jennings | May 30 0
Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift
Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Industry Spotlight News Security Boulevard (Original) Spotlight 

Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift

May 23, 2023 Michael Vizard | May 23 0

Top Stories

Cyera Taps Microsoft OpenAI Service to Improve Data Security
Cybersecurity Data Security Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight 

Cyera Taps Microsoft OpenAI Service to Improve Data Security

June 9, 2023 Michael Vizard | Yesterday 0
Sentra Adds Tool for Redacting Generative AI Prompts
Application Security Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access News Security Boulevard (Original) Spotlight 

Sentra Adds Tool for Redacting Generative AI Prompts

June 9, 2023 Michael Vizard | Yesterday 0
Identity Security a Top Priority as Threats Evolve
Analytics & Intelligence Cloud Security Cybersecurity Data Security Featured Identity & Access News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence 

Identity Security a Top Priority as Threats Evolve

June 9, 2023 Nathan Eddy | Yesterday 0

Security Humor

Randall Munroe’s XKCD ‘UFO Evidence’

Randall Munroe’s XKCD ‘UFO Evidence’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.

Cloud Capabilities Poll

Step 1 of 7

14%
What % of your production applications run in the Cloud? (Choose 1)
Which cloud platforms are in use in your company? (Select all that apply)
  • Modernize applications
  • Migrate additional workloads to the cloud
  • Improve DevOps performance
  • Ensure cloud workloads are sufficiently secured
  • Make your cloud implementation more cost efficient
  • Operate/Monitor the cloud environment more effectively
Very UncomfortableUncomfortableNeutralComfortableVery Comfortable
Cloud Architecture
Cloud Networking
Cloud Security
Cloud Cost Management
Containers and Kubernetes
DevOps
What do you consider cloud service companies that help organizations build and manage modern infrastructure solutions? (Choose 1)
Very UnlikelyUnlikelyNeutralLikelyVery Likely
Cloud architecture/design
Application prototyping
Build and Implementation
Ongoing monitoring and management
What is the size of your business or organization? (Choose 1)