energy sector
![Honeywell](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/22114743/honeywell-logo-red-400x200.jpg)
Honeywell Maxpro VMS/NVR systems vulnerable to hijacking
Honeywell’s Maxpro VMS and NVR, network video recorders and video management systems deployed in commercial, manufacturing and energy facilities around the world, sport …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093701/power-utilities-400x200.jpg)
US utilities targeted with spear-phishing emails impersonating engineering licensing board
If you worked in a US company in the utilities sector and received an email notification telling you that you’ve failed your “Fundamentals of Engineering” …
![biohazard energy](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111533/biohazard-energy-400x200.jpg)
Cyber espionage and sabotage attacks pose an increasing threat to the energy industry
Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase …
![Deloitte report](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095319/deloitte-report-400x200.jpeg)
Evaluating the biggest cyber threats to the electric power sector
The network of power plants and lines connecting to homes and businesses is widely considered to be among the most critical infrastructure in the world. It’s also one of …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100217/biohazard-malware-400x200.jpg)
Researchers link Industroyer to NotPetya
ESET researchers believe they have found evidence that the TeleBots APT was behind the December 2016 attacks against the Ukraine energy sector that resulted in blackouts …
![energy](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100505/energy-400x200.jpg)
Building a sound security strategy for an energy sector company
As more and more attacks against companies working in the energy sector become public, it is becoming increasingly clear that those systems are far from impermeable. And …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege