#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

stuxnet | Breaking Cybersecurity News | The Hacker News

Category — stuxnet
Top 7 Key Network Security Trends to Watch in 2011

Top 7 Key Network Security Trends to Watch in 2011

Dec 23, 2010
Network security is on everyone's mind as 2010 comes to an end. Adam Powers, CTO of Atlanta-based Lancope, offers insights into expected trends for 2011. IT Consumerization and Internal Threats The introduction of consumer devices into corporate networks is reshaping security strategies. Traditional perimeter defenses like firewalls and intrusion prevention systems (IPS) are no longer sufficient. Companies must address security for smartphones, MiFi devices, and other consumer mobile devices. Rise of Social Media The growth of social media platforms like Facebook has created new attack surfaces for cyber threats. This development demands heightened awareness and security measures. Utilities as Targets The Stuxnet virus has alerted utilities, particularly those under NERC-CIP compliance, to the need for improved security as SCADA systems transition to IP. This shift demands a significant upgrade in security measures. Information Leakage and Reputation Damage The Wiki...
U.S. Adopts Military Tactics for Rising Cyberwar Threats

U.S. Adopts Military Tactics for Rising Cyberwar Threats

Dec 04, 2010
The increasing threats of cyberwar are keeping U.S. officials busy alongside ongoing wars on terror and drugs. Recent incidents highlight the rising cyberwarfare concerns: Google reported espionage attacks originating from China, mysterious Internet traffic activities related to China, the Stuxnet worm targeting Iranian nuclear centrifuges, an attack on the WikiLeaks site following the release of classified U.S. documents, and the significant Internet attack on Estonia a few years ago. To address these cyber threats, the U.S. has adopted military strategies for cybersecurity, establishing Cyber Command and placing national cybersecurity under the Department of Defense. However, relying solely on offensive strategies is not the best defense. Gary McGraw, CTO at Cigital and author, argues that more secure software, rather than cyber warriors, is essential to protect networks and online data. In his article, "Cyber Warmongering and Influence Peddling," McGraw emphasizes the nee...
Stuxnet Code Now Available to Hackers, Posing Major Threat to Infrastructure

Stuxnet Code Now Available to Hackers, Posing Major Threat to Infrastructure

Dec 02, 2010
According to a report from Sky News, the Stuxnet worm has already been traded on the black market. The report does not specify whether this refers to the source code or binary samples. British security specialists now fear that terrorists could use the worm to attack critical infrastructure. The report quotes an IT security consultant to the UK government as saying, "You could shut down power stations, you could shut down the transport network across the United Kingdom." There is hard evidence that Stuxnet is in the hands of highly motivated, well-trained, and well-financed criminals. Sky News' source declined to provide more precise information. Audun Lødemel, VP of Marketing and Business Development at German IT service provider Norman, believes that "It was just a matter of time before the Stuxnet code was made available for anyone, with even the most basic knowledge of coding, to alter and potentially wreak havoc on the UK infrastructure. This is serious stuff,...
cyber security

SaaS Security Made Simple

websiteAppomniSaaS Security / SSPM
Simplify SaaS security with a vendor checklist, RFP, and expert guidance.
The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience

The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience

Jun 26, 2025Data Protection / Compliance
SaaS Adoption is Skyrocketing, Resilience Hasn't Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of managing infrastructure. But with their rise comes a subtle, dangerous assumption: that the convenience of SaaS extends to resilience. It doesn't. These platforms weren't built with full-scale data protection in mind . Most follow a shared responsibility model — wherein the provider ensures uptime and application security, but the data inside is your responsibility. In a world of hybrid architectures, global teams, and relentless cyber threats, that responsibility is harder than ever to manage. Modern organizations are being stretched across: Hybrid and multi-cloud environments with decentralized data sprawl Complex integration layers between IaaS, SaaS, and legacy systems Expanding regulatory pressure with steeper penalties for noncompliance Escalating ransomware threats and inside...
Expert Insights Articles Videos
Cybersecurity Resources