Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Are you ready for the next generation of cyberattack?

Of all the attention the recent Helsinki summit generated, one aspect has garnered virtually no coverage, but it has the ability to shake America and its companies to the core – the threat of data manipulation. Read this article to learn about the next generation of cyberattack, including: How hackers will manipulate, doctor and fake data to disrupt businesses and governments, if not...

Cyber security rules needed for pipelines: FERC commissioners

If you have turned on the news or picked up a paper lately, you have probably seen reports that foreign enemies are increasingly launching cyber-attacks on America’s critical infrastructure, including energy facilities. To address these threats, electric grid operators must comply with mandatory standards overseen by the Federal Energy Regulatory Commission (FERC) that protect...

Helping it click into place – Our monthly Asia cybersecurity update

During 2017, cyberattacks continued to evolve and develop sophistication, exploiting both previously unidentified vulnerabilities and known vulnerabilities in new ways. Ransomware attacks such as Petya and WannaCry put critical functions across the world and across industries on hold, while the Mirai botnet attack, unleashed in late 2016, highlighted the increasing vulnerabilities of...

Cyber Attacks on U.S. Power Grids Can Be Deterred With Password Changes

A key to preventing cyber attacks from crippling U.S. power grids could be changing passwords on internet routers, wifi-connected thermostats and smart lawn-sprinklers. “A significant share” of internet attacks result from unchanged factory default passwords on web-connected devices that allow hackers to break in and and install malware, according to a Jan. 18 report by the Advanced...

Triton Malware Shuts Down Industrial Plant

Cybersecurity experts at FireEye have issued a warning after a recent hacker attack caused “operational disruption to critical infrastructure” at an unnamed industrial plant. The hackers introduced a malware program that FireEye is calling “Triton” into the security system, likely in preparation for a larger attack. Learn...

« Older Entries