Search results: colonial pipeline

Ransomware Attack Hits a Major US Oil Pipeline

Colonial Pipeline, one of the largest oil pipelines in the US, was hit by a ransomware attack that forced it to shut down. This 5,500-mile-long pipeline, which carries more than 100 million ...
Microsoft Colonial Pipeline, lessons, vulnerabilities pipedream supply chains CI/CD pipeline dev environment Linux

Of Pipelines And Cybersecurity

One of the scariest phrases I have ever encountered is “gasoline pipeline” –thousands of miles of three foot diameter pipes buried in the ground for decades carrying billions of gallons of one ...
Security Boulevard

Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast

Colonial Pipeline reported a cyber-attack that resulted in a halting of their fuel pipeline operations to the East Coast per sources including this Bloomberg article originally posted on May 8, 2021. Just ...

World Economic Forum Oil and Gas Cyber Resilience Pledge

In the year since the calamitous Colonial Pipeline cyber-attack, we’ve seen a heightened awareness and a greater level of engagement in cybersecurity initiatives from the government and industry leaders. For example, President ...
Obi Wan Kenobi (miniature)

Best of 2021 – DarkSide Ransomware Gang Struck Down — but by Whom?

DarkSide, hackers of the Colonial Pipeline, has hurriedly shut up shop. It claims that its servers and cryptocurrency balances have disappeared ...
Security Boulevard
Evolving Ransomware Tactics Include Recruiting Insiders and DDoS Attacks

Evolving Ransomware Tactics Include Recruiting Insiders and DDoS Attacks

The attention generated by the DarkSide ransomware attack against Colonial Pipeline in May has helped to reshape the ransomware threat landscape. One of the most important modifications came when the digital crime ...
Defining What it Means to Secure Software in Runtime

Defining What it Means to Secure Software in Runtime

The most critical and challenging weakness in cybersecurity is the inability to protect applications, or software, at runtime.    Runtime is a vulnerable blind spot deep within the application infrastructure. Today’s cybersecurity tools ...
Webinar: REvil Ransomware - Pick Your Path

Webinar: REvil Ransomware – Pick Your Path

Today's ransomware actors are operating to devastating effect as evidenced by the Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business ...
Cyber Security Roundup for July 2021

Cyber Security Roundup for July 2021

    A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, June 2021.How was UK Government Building CCTV Leaked?The Sun newspaper ...

When Cybersecurity Regulation Becomes Mandatory

Sunday, June 27th, marked the 30-day vulnerability assessment report deadline prescribed in late May by the Transportation Security Administration (TSA). In direct response to the Colonial Pipeline cyber-attack that shut down operations ...