HomeTechnology

Technology

Denodo

 

From Scripts to Sentience: Securing Agentic Systems in a Connected World

Over the past two decades, digital systems have evolved from static, rule-based automation into increasingly dynamic and context-aware programs....

Malicious Production Override: Remote Control Hijack of Industrial Systems

Context and background Imagine a hidden enemy slipping into the digital heart of a factory, a power plant, or even...

The AI Model Poisoning Attack: Manipulated Training Data Corrupts Client Deliverables

Scenario: A large IT/ITES firm specializing in AI/ML-driven analytics and automation is targeted by cybercriminals who execute a model...

A Critical Production Machines Like PLCs and SCADA Halt Due to Industrial System Vulnerabilities

Industry 4.0 has been transforming manufacturing operations. Production machines are becoming digitized, enabling real-time monitoring, predictive maintenance, and enhancing...

API Abuse Leads to Mass Account Enumeration

Application Programming Interface (API) has become one of the most common and effective methods for integrating different systems. They enable...

Disruption of Production Network through Hijacked Vendor PLC Maintenance Session

In today's rapidly evolving digital environment, the interdependence of systems and networks leads to increased efficiency and productivity. However,...
- Advertisement -

Silent Hijack: Rogue 5G Networks Compromising Aircraft Communication

Although there are many advantages to integrating 5G technology into aviation communication systems, there are also significant risks. Rogue...

Shared Services VPN Compromise Leads to Cross-Business Data Exposure

Introduction In recent times, the integrity of shared services has become increasingly crucial for businesses around the globe. Unfortunately, the...

AI-Powered Supply Chain Attack: Manipulated AI in Just-In-Time (JIT) Manufacturing

We have been witnessing technological disruption almost every decade, be it the Internet burst, Cloud computing or the recent...

Customer Shipment Tracking Data Exposed via Unsecured API Endpoint

Scenario & Impact: When Convenience Turned Into Exposure In India’s fast-moving logistics industry, real-time shipment tracking has become standard. However,...
Lenovo OEM

 
 
error: Content is protected !!

Share your details to download the report 2026

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch