The maritime transportation system, the lifeblood of global trade, is undergoing a digital revolution. Automation and artificial intelligence (AI) are transforming how ships operate and cargo moves. However, this increased reliance on technology creates a double-edged sword: while AI offers powerful tools for cybersecurity, it also presents new vulnerabilities to exploit. The growing threat of adversarial AI (AAI) in maritime cyber security and how the industry can navigate these challenging w
threats (5)
Our weekly Cyber Threats & Vulnerabilities Report is provided to our Red Sky Alliance Members to consolidate both prominent government and private cyber security reporting which include descriptions (TTPs), indicators of compromise (IoCs) and at times remediation directions.
Link to full report: IR-22-139-001_IntelSummary139.pdf
The very first version of what would become known as ‘email’ was invented in 1965 at Massachusetts Institute of Technology (MIT) as part of the university's Compatible Time-Sharing System. Emails, an old, tried and true method of communication – emails are still used for both good and bad purposes. In Belgrade, a series of email bomb threats were sent on 16 May to Serbian government authorities. The emails included threats against schools, bridges, restaurants and a soccer match, bringing its
Our weekly Cyber Threats & Vulnerabilities Report is provided to our Red Sky Alliance Members to consolidate both prominent government and private cyber security reporting which include descriptions (TTPs), indicators of compromise (IoCs) and at times remediation directions.
Link to full report: IR-22-097-001_IntelSummary097.pdf
Our weekly Cyber Threats & Vulnerabilities Report is provided to our Red Sky Alliance Members to consolidate both prominent government and private cyber security reporting which include descriptions (TTPs), indicators of compromise (IoCs) and at times remediation directions.
Link to full report: IR-22-083-001_IntelSummary083.pdf