AiLock
You must login to view this content
You must login to view this content
A financially motivated threat actor known as Storm-2561 has been running a credential theft campaign since May 2025, manipulating search engine rankings to push fake VPN software toward enterprise users. The campaign targets employees searching for tools such as Pulse Secure, Fortinet, and Ivanti, redirecting them to spoofed websites that serve malicious download packages. Once […]
The post Attackers Use SEO Poisoning and Signed Trojans to Steal VPN Credentials appeared first on Cyber Security News.
The rise of AI-assisted software development has introduced a new bottleneck: code verification. While AI can generate code at unprecedented speeds, manually verifying that code for quality and security often breaks a software developer's flow.
The post Announcing native MCP Server in SonarQube Cloud appeared first on Security Boulevard.
Author, Creator & Presenter: Dhivva Balasubramanian - Cybersecurity IAM Manager, Southwest Airlines
Our thanks to BSidesCache for publishing their Creators, Authors and Presenter’s outstanding BSidesCache 2025 content on the Organizations' YouTube Channel.
The post BSidesCache 2025 – Hackers Don’t Break In. They Log In. appeared first on Security Boulevard.
You must login to view this content
CTG has announced the launch of a cyber resilience scoring dashboard that helps organizations quantify risk, prioritize remediation, and track measurable improvement over time. The dashboard is part of the Group’s Cegeka Security Advisory Framework (CSAF), a modular approach that combines assessments and advisory services to help organizations continuously improve their security strategy. By translating assessment outcomes into a single score and clear trends, the dashboard provides immediate visibility into cyber risk, program maturity, and … More →
The post CTG unveils cyber resilience scoring dashboard for measurable risk reduction appeared first on Help Net Security.
You must login to view this content
You must login to view this content
Explore key cybersecurity requirements and implementation deadlines for electric power utilities included in the NERC CIP-003-9 standard for Low-Impact BES (Bulk Electric System) Cyber Systems, and how Tenable can help deliver the comprehensive visibility required to ensure compliance.
Key takeawaysElectric power utilities in North America are under pressure to comply with the latest security provisions from the North American Electric Reliability Corporation (NERC). The newest set of provisions will be implemented over the next four years, starting in April of this year.
Specifically, the NERC Critical Infrastructure Protection (CIP) Reliability Standard CIP-003-9 becomes officially enforceable on April 1, 2026. As part of the Supply Chain Low-Impact Revisions, this standard introduces specific requirements for electric power utilities and related sectors with low-impact BES (Bulk Electric System) cyber systems. This update is particularly significant for municipally owned utilities and cooperatives that may have previously operated under lighter oversight but are now pulled into higher compliance tiers due to recent updates like CIP-002-7.
At a high level, the BES includes the electrical generation resources, transmission lines, and interconnections generally operated at voltages of 100 kV or higher. Historically, “low-impact" assets were subject to lighter oversight, but the evolving threat landscape—specifically targeting the supply chain—has necessitated a more rigorous approach.
CIP-003 requires organizations to specify consistent and sustainable security management controls that establish responsibility and accountability to protect BES Cyber Systems against compromise that could lead to misoperation or instability in the BES.
The NERC CIP compliance roadmap: 2026, 2028, and 2030The transition to full compliance isn't a one-time event; it's a tiered rollout. Understanding these milestones is critical for budget and resource planning:
DeadlineMilestoneFocus AreaApril 1, 2026Enforcement beginsImplementation of Supply Chain Low-Impact Revisions (CIP-003-9).2028 horizonExpanded controlsFocus shifts toward deeper evidence collection and refined incident response reporting.2030 and beyondFull maturityContinuous monitoring and automated audit trails become the expected standard.How Tenable OT Security simplifies NERC CIP alignmentMeeting NERC CIP requirements can be a manual, spreadsheet-heavy nightmare—especially for local government entities that lack the massive compliance departments found in larger investor-owned utilities. Tenable OT Security acts as a force multiplier, allowing small IT teams to automate asset discovery and evidence collection without exhausting limited public sector budgets. Tenable OT Security is designed to help organizations meet these technical and operational demands with confidence, turning a compliance burden into a strategic advantage.
We address the core pillars of the standard through:
Tenable OT Security supports compliance with CIP-003 through real-time alerts designed to help security teams enforce security management policies.
An example of how a user can leverage the Compliance Dashboard in Tenable OT Security with multiple security frameworks selected to evaluate, monitor, and report on compliance with relevant regulatory compliance frameworks and industry standards.
Tenable OT Security alerts in real-time on any unauthorized access activities to the OT environment as well as enabling the enforcement of security management policies. In addition, it fully audits all OT activities, including controller engineering activities like logic updates, configuration changes and firmware uploads/downloads. Tenable OT Security tracks the source of the activity, the exact commands used, the devices impacted and the specific impact to these devices, as well as the date and time of each activity. This comprehensive audit trail enables grid owners and operators to establish responsibility and accountability. It also helps in the prevention of malicious or erroneous activities that could lead to misoperation or instability of the plant.
The Tenable One advantageWhile NERC CIP focuses specifically on the grid, modern utilities don’t operate in a vacuum. The convergence of IT and OT means your cyber exposure is interconnected.
For state and local government entities that operate power generation, transmission or distribution infrastructure, cyber risk doesn’t exist solely within the grid environment. IT systems supporting billing, emergency communications, identity access management and cloud based service delivery are increasingly interconnected with OT environments. For a local government, a cyber incident in the grid doesn't just impact power; it can ripple through essential public services. Tenable One provides a unified view, helping SLG leaders bridge the gap between small IT teams and complex OT systems.
The Tenable One exposure management platform provides a unified view of your entire attack surface. By combining OT-specific insights with IT, cloud, and identity data in a single view, Tenable One allows you to see beyond basic compliance—enabling you to prioritize risk across your entire infrastructure and communicate your security posture from the control room to C-suite.
Learn more: